1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
3 years ago
7

Etapas del desarrollo​

Computers and Technology
1 answer:
cestrela7 [59]3 years ago
5 0

Answer:

Las etapas del desarrollo humano

Etapa prenatal. Comprende desde la concepción hasta el parto. ...

Etapa de la niñez. Es la comprendida entre el nacimiento y los tres años. ...

Primera infancia. Desde los 3 a los 6 años. ...

Infancia intermedia. ...

Adolescencia. ...

Etapa adulta temprana.

Edad adulta intermedia.

Edad adulta tardía.

Explanation:

You might be interested in
Consider a system that contains 32K bytes. Assume we are using byte addressing, that is assume that each byte will need to have
Montano1993 [528]

Answer:

n = 15

Explanation:

Using

Given

Number of bytes = 32k

At the smallest scale in the computer, information is stored as bits and bytes.

In the cases when used to describe data storage bits/bytes are calculated as follows:

Number of bytes when n = 1 is 2¹ = 2 bytes

When n = 2, number of bytes = 2² = 4 bytes

n = 3, number of bytes = 2³ = 8 bytes

So, the general formula is

Number of bytes = 2^n

In this case

2^n = 32k

Note that 1k = 1024 bytes,

So, 32k = 32 * 1024 bytes

Thus, 2^n = 32 * 1024

2^n = 2^5 * 2^10

2^n = 2^15

n = 15.

6 0
4 years ago
Need help:(!!!! I’ll mark brainliest if correct
defon

Answer:

software engineer is the answer

Explanation:

g

4 0
3 years ago
CSCU EXAM TEST FINAL1-A software or hardware that checks information coming from the Internet and depending on the applied confi
Nastasia [14]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol can be defined as a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and good performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Whats the difference between firms that provide services and firms that sell products?
Sunny_sXe [5.5K]
One is for entertainment (e.g. movies) and one is an advertisement/commercial
4 0
3 years ago
Read 2 more answers
Write a program that reads a sequence of up to 20 pairs of employee names and IDs. Store the data in an object designed to store
sladkih [1.3K]

Answer:

The code will be in Python3

you will have to enter the number of employee data and it will display all the data entered in the correct format.

Explanation:

class Solution:

   def __init__(self):

       self.firstName=""

       self.lastName=""

       self.employeeID=0

   def getData(self):

       self.firstName=input("please enter your first name: ")

       self.lastName=input("please enter your last name: ")

       self.employeeID=input("please enter your ID: ")

   def showData(self):

       p="{}\t{}\t{}".format(self.firstName,self.lastName,self.employeeID)

       return p

num=int(input("please enter the number of employee data you want to enter: "))

data=[]

for i in range(num):

   t1=Solution()

   t1.getData()

   data.append(t1.showData())

for i in data:

   print(i)

7 0
3 years ago
Other questions:
  • What are some common characteristics of jobs in this career cluster? check all that apply
    10·2 answers
  • According to the ________ definition of organizations, an organization is seen as a means by which primary production factors ar
    14·1 answer
  • You support Richman Investments, a brokerage firm that employs 20 brokers. Each broker has his own client computer, and the firm
    15·1 answer
  • .All of the following are true with the respect to implicitinvocation except:
    8·1 answer
  • What should you do to protect your copyright
    7·1 answer
  • For most applications, saving sound files at the _____ bit resolution provides a good balance of sound quality and file size.
    15·2 answers
  • Maureen downloads three pictures of cabin sizes for her siblings to vote on. She inserts one picture per slide. The third pictur
    10·1 answer
  • Business competition is no longer limited to a particular country or even a region of the world.
    10·1 answer
  • You are designing software for elderly people. Which two features can you
    6·1 answer
  • Find the name of the professor with the maximum percentage of students that failed his course.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!