1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maksim [4K]
2 years ago
5

Is this right or not???????????

Computers and Technology
2 answers:
borishaifa [10]2 years ago
6 0
I think it’s true Bc some people may use different techniques
yKpoI14uk [10]2 years ago
6 0

Answer:

yes you are correct

Explanation:

You might be interested in
What is the maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol? Why?
KATRIN_1 [288]

Answer:

Under IEEE 802.1Q, the maximum number of VLANs on a given Ethernet network is 4,094 (4,096 values provided by the 12-bit VID field minus reserved values at each end of the range, 0 and 4,095).

Explanation: found it from google

6 0
3 years ago
Read 2 more answers
How can I download music and films at home without breaking the law?
mina [271]

Answer: use a legal music downloader

Explanation: :)

5 0
3 years ago
Read 2 more answers
Assuming your computer only has one network card installed; explain how your virtual machine is able to share that card with you
adell [148]

Answer and Explanation:

Virtual machine have one imitated organize connector and there is one of a kind MAC address is allocated with it.  

The system driver of the Virtual machine's performs all the task:  

  • The system driver places physical connector in 'promiscuous' mode implies physical connector will acknowledge all system parcel paying little heed to MAC address,then virtual machine's driver channels its bundles and direct it to the virtual machine.
5 0
3 years ago
Consider two vectors that are NOT sorted, each containing n comparable items. How long would it take to display all items (in an
Darina [25.2K]

Answer:

The correct answer to the following question will be "Θ(​n​2​)

". The further explanation is given below.

Explanation:

If we're to show all the objects that exist from either the first as well as the second vector, though not all of them, so we'll have to cycle around the first vector, so we'll have to match all the objects with the second one.

So,

This one takes:

= O(n^2)

And then the same manner compared again first with the second one, this takes.

= O(n^2)

Therefore the total complexity,

= Θ(​n​2​)

7 0
3 years ago
How does naming affect a variable’s creation and use?
Evgen [1.6K]

Answer:

Each variable is named so it is clear which variable is being used at any time. It is important to use meaningful names for variables: ... The name given to each variable is up to the programmer, but ideally a variable name should have meaning, ie it should reflect the value that it is holding.

Variables make code more than a static set of instructions. They allow logic to occur, enabling developers to measure time, analyze data, and customize the program to the user. Variables are so important to the code that they deserve a good name that accurately describes their purpose

Explanation:

4 0
2 years ago
Other questions:
  • Write a Java program to print the result in the series 10, 15, 20, 25, ..., 50. Hint: You can use an iteration statement for wri
    9·1 answer
  • The concept of ____ refers to the idea that the internet is designed for all content to be treated equally.
    12·1 answer
  • Which software application offers a variety of templates for creating reports, flyers, and newsletters that you can access withi
    7·1 answer
  • For which of the following careers is technology’s connectivity factor most important?
    13·2 answers
  • What is the best option for sharing Word documents on a Microsoft network because it provides finer degrees of versioning contro
    6·1 answer
  • How do assignment article computer security, ethics and privacy?
    15·1 answer
  • If cell G7 contains the function ________, it states that if the value in cell C3 is 9, the number 7 will be assigned to cell G7
    6·1 answer
  • "You have created a Word document named apple.docx using Microsoft Word. What type of a file is apple.docx ? Select all that app
    14·1 answer
  • If a computer uses 500 characters, how many bits this system requires to give different code to all characters?
    15·1 answer
  • Your network uses a network address of 137. 65. 0. 0 with a subnet mask of 255. 255. 0. 0. How many ip addresses are available t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!