1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
10

Plagiarism allowed 5%Best Answer gets extra points

Computers and Technology
2 answers:
kherson [118]3 years ago
7 0

ysoudoshzmzbzb.

Explanation:

》☆♡☆□☆♡▪︎□hx I xnbxjxozkx

Semmy [17]3 years ago
4 0
I mean it’s not good to do it cause I feel like teachers always find out about it.
You might be interested in
Can the redirection shell metacharacter be used to redirect between a command and another command?
Maksim231197 [3]
The answer is NO it cannot.
5 0
4 years ago
What are some good apps to download to screenshot your screen?
LenaWriter [7]

Answer:

AZ Screen Recorder.

Firefox ScreenshotGo Beta.

Screenshot Touch.

Screen Master.

Most personal assistant apps

7 0
3 years ago
If you want to change your system settings, what should you use
Vedmedyk [2.9K]

Answer:

you click on your profile, and you should see settings

Explanation:

4 0
3 years ago
Given a effective delay of 99ms when network usage is 74%, what is the effective delay when network usage = 84% ?
NARA [144]

148.5 ms is the effective delay when network usage = 84% .

<h3>what is a computer network?</h3>
  • A group of computers sharing resources that are available on or offered by network nodes is known as a computer network.
  • Over digital links, the computers communicate with one another using standard communication protocols.
  • These connections are made up of telecommunication network technologies, which are based on physically wired, optical, and wireless radio-frequency means and may be set up in a number of different network topologies.
  • Personal computers, servers, networking equipment, and other specialized or general-purpose hosts can all function as nodes in a computer network.
  • They can have hostnames and are identifiable by network addresses.
  • After being assigned, hostnames act as recognizable labels for the nodes and are seldom updated.
  • Network addresses are used by communication protocols like the Internet Protocol to locate and identify the nodes.

To learn more about the topic, refer to the following link

brainly.com/question/8118353

#SPJ4

3 0
2 years ago
What type of memory or storage device is prone to losing data if the power goes out?
Veseljchak [2.6K]
The answer is (c.) a DDR SDRAM module.

DDR SDRAM stands for Double data rate synchronous dynamic random-access memory. It is a form of temporary data storage in a computer. So when it comes to power down, the data stored in this RAM is most likely to lose.
7 0
3 years ago
Other questions:
  • Explain how do we combine multiple Boolean values?​
    5·1 answer
  • Jane works in the sales department of a service company. She has impressive interpersonal skills and always turns up for work on
    11·2 answers
  • Technlogies are having a negative impact on business true or false
    7·1 answer
  • The Distribute commands will evenly distribute the rows and columns within what? The width and height of the document. The width
    5·1 answer
  • 7.12 LAB: Contains the character
    12·2 answers
  • Up to 10 people is a good guideline for the size of your study group.
    15·1 answer
  • Someone may choose to own a car instead of leasing because:
    14·2 answers
  • Define function multiply(), and within the function: Get user input() of two strings made of whole numbers Cast the input to int
    11·1 answer
  • Murray University invested over $450,000 in a customized learning management system so that professors could put courses online
    9·1 answer
  • Think of a genre (science, music, math, sports, video games, etc.) and create at least 10 questions. You can decide whether you
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!