1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anuta_ua [19.1K]
3 years ago
12

Help me please with this

Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
7 0

Answer:

Explanation:

QUestion 2 is A

QUestion 1 is A i think

You might be interested in
Which is the highest level of the hierarchy of needs model?
Georgia [21]

<span>Maslow's hierarchy of needs is often portrayed in the shape of a pyramid with the largest, most fundamental needs at the bottom and the need
forself-actualization and self-transcendence at the top.</span>
5 0
3 years ago
Read 2 more answers
Databases, authentication, and user accounts are all part of a website's ______________.
Varvara68 [4.7K]

Answer:

The answer is "Backend".

Explanation:

The Backend Development applies to just the webserver side when they concentrate mostly on how well the site functions. The website generally includes 3 sections consist of all this web design: a client, program, or server. The Backend user codes are the information provided by the database to both the web browser.

5 0
3 years ago
Which type of page of replacement algorithm is Windows XP and Unix are using?
mel-nik [20]

Answer:

Windows XP uses the Local Page Replacement algorithm. It is a type of FIFO. In this, Pages are taken from processes using more than their minimum working set and Processes initialize with a default of 50 pages. XP monitors page fault rate and adjusts working set size accordingly.

UNIX uses the Global replacement Algorithm through Modified second-chance clock algorithm.  Here Pages are aged with each second and Pages that are not used for a long time will eventually have a value of zero.

7 0
4 years ago
Approximately how many user accounts were affected by a 2013 hack of the yahoo technology company, which it just announced this
torisob [31]
About one billion user accounts were affected
3 0
4 years ago
Suppose you want to encode the numerals 0–9 and the 26 letters of the alphabet, using separate codes for lowercase and uppercase
labwork [276]

Lets first work out how many different codes would be needed to represent everything. 26 for lowercase, 26 for uppercase, and 10 for 0-9. Total, that makes 62 needed codes.

If we start with 0, we need to go up to 61 to represent all the characters. Thus, we can convert 61 to binary and count the number of digits needed to represent that as the last number in the set and that will tell us how many digits are needed.

61 in binary is 111101, so we need 6 digits to represent that number. The answer is B.

4 0
4 years ago
Other questions:
  • Which of the following is true about a point-and-shoot camera? They always have lenses that you can take on and off. They are of
    8·2 answers
  • Which best describes the difference between stocks and bonds ?
    8·2 answers
  • If the value of the expression,
    13·1 answer
  • No workplace is immune to the threat of workplace violence. true or false
    9·2 answers
  • What kind of security features does Microsoft Security Analyzer promise?
    5·1 answer
  • Instructions:Select the correct answer.
    5·1 answer
  • Which two statements are true about the Data Sync functionality? (Choose two.)
    15·1 answer
  • Write a C++ program that stores the integers 50 and 100 in variables and stores the sum of these two in a variable named total.
    11·1 answer
  • You have a screen and a pen, which is an instance of the Turtle class.
    13·2 answers
  • Hubs connect network hosts in which configuration?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!