1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vfiekz [6]
3 years ago
13

Any correct answers will be helpful.

Computers and Technology
1 answer:
melisa1 [442]3 years ago
5 0

Answer:

is this overdue

Explanation:

it probly is you are smart you can do this

You might be interested in
Is bit stuffing necessary in the control or address field in theHDLC protocol? why?
steposvetlana [31]

Answer:

Many network and communication protocols require bit stuffing for the following purposes: to avoid the interpretation of data as control information. For example, with six consecutive 1 bits, X.25 uses the bit stuffing,signal the beginning and end of a frame.

High-level Data link control (HDLC) is a bit-oriented protocol for point-to-point and multi-point communication.P/F bits are present in HDLC control field.

So,Yes bit stuffing is necessary in control field.

7 0
4 years ago
How do you implement instruction level parallelism
netineya [11]

Answer:

To obtain substantial performance enhancements, we must exploit ILP across multiple basic blocks.

Explanation:

8 0
3 years ago
When a program lets the user know that an invalid choice has been made, this is known as:?
kirza4 [7]

When a program lets the user know that an invalid choice has been made, this is known as a error message.

7 0
3 years ago
When we focus on stereotypes we may ___________________. a. experience culture shock b. develop ethnocentrism c. unconciously lo
alisha [4.7K]
When we focus on stereotypes we may <span>unconsciously look for information to support our generalizations .</span>
3 0
3 years ago
Read 2 more answers
The two primary methods of memory allocation are:
levacccp [35]

Answer:

The answer is

Stack and heap

4 0
3 years ago
Other questions:
  • Points Possible: 6, Points Correct: 4
    6·1 answer
  • Local variables:A. Lose the values stored in them between calls to the method in which the variable is declared
    8·1 answer
  • ¿dispositivos de hardware Que permite identificar la huella digital registrada por el usuario?
    11·1 answer
  • What is the definition of “potential energy”?
    6·1 answer
  • In addition to regular watch features, which two features are often found on smart watches?
    10·1 answer
  • The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for
    11·1 answer
  • Write a program that asks the user for the name of their dog, and then generates a fake DNA background report on the pet dog. It
    11·1 answer
  • Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services
    12·1 answer
  • Do you ever wonder what types of media you will be using five years from now or when you graduate from college or a training pro
    9·1 answer
  • String objects are modified with string slices true or false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!