1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
3 years ago
13

Question #8

Computers and Technology
1 answer:
Aleksandr [31]3 years ago
8 0

there is relationship between schools and nutrition.

because school is a place to read but students didn't get it early by reading they get it by practically

in my opinion.

You might be interested in
Which field in a Transmission Control Protocol (TCP) header provides the next<br> expected segment?
Papessa [141]

In a Transmission Control Protocol (TCP) header next  Expected segment is provided by Acknowledgment Number

Explanation:

  • TCP is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in the Internet Protocol.
  • The fields in TCP Segment Header are Source Port, Destination Port, Sequence Number, Acknowledgement Number, Header Length, Flags, Window Size, TCP Checksum and Urgent Pointer.
  • The Acknowledgment Number is a  32 Bit number field which indicates the next sequence number that the sending device is expecting from the other device.
  • The SYN packets consume one sequence number, so actual data will begin at ISN+1. The sequence number is the byte number of the first byte of data in the TCP packet sent.
  • If the acknowledgment flag is set in the flags field, the acknowledgment number field holds the sequence number of the next byte that the receiver expects.
3 0
4 years ago
What RAID level is a stripe set with distributed parity? This RAID level is implemented in Windows Server 2012 R2?
umka21 [38]

Answer:

The correct answer to the following question will be "RAID 5".

Explanation:

  • RAID 5 is an obsolete array of the setup of independent disks that uses parity disk striping. RAID 5 classes have a total of three and no full hard drives (HDDs).
  • RAID 5 is considered to be among the most stable RAID systems because the stability data is scattered throughout all drives.
  • In a RAID 5 package, the minimum amount of disks is three (two for records, and one for variance). The maximum amount of disks in a RAID 5 system is infinite in principle even though your disk array may have created-in limitations. RAID 5 however only defends against a single failure of the motor.

Therefore, this will be the right answer.

6 0
3 years ago
Given a variable temps that refers to a list, all of whose elements refer to values of type float , representing temperature dat
VARVARA [1.3K]

Answer:

The problem of the question code is as follows:

Explanation:

  1. There must be the items in the list: The above question code is in python language. The temps are a list type variable that is used to hold the collection of items or value. But in the above code, there is no item in the K list. So first remove this problem with the help of add the value on the list. There are two ways to add value to the list:- 1. Define the static list element by writing like "temps=[1.2,2.4,4.5]". and 2. Take input from the user and then add by "temps.append(item)".
  2. The syntax of the for loop: The syntax of the for loop is not right because it holds the "range" keyword which is written when we give the numeric value like, "for x in range(2)" or "for x in range(1,2)". So to correct for syntax the user needs to write "for k in temps:".

If the user removes the above-defined error from the code then the above code will run correctly

5 0
3 years ago
What takes information entered into a given system like sales, and sends it automatically to all downstream systems and processe
Alenkinab [10]

Answer:

Forward integration

Explanation:

In business driven computer systems, a technique is used to that takes all the information entered into the system and then forward it automatically to all the processes and the systems that are downstream.

Forward integration can be utilized as business methodology that includes extending an organization's exercises to incorporate the immediate appropriation of its items. Forward integration is casually alluded to as removing the mediator.

8 0
4 years ago
How are static variables and methods created in Java? What happens if a non-static method of a class tries to access a static va
9966 [12]

Answer:

Static variables are the variables decaraed with keyword static, static variables must be deacraled inside the class body, means we can not declare a static variable inside a method or consttructor, static variable belongs to class, for a class only one copy is created for static variable and used by all the objects/instances.

Static variable can access with class name like

X.i

Static method are the methods defined with static keyword, static method are also part of a class, we can access static meethod using class name like

X.printI()  

Explanation:

class X

{

//to create a static variable we need use static keyword with variable name like

public static int i;

// to create a static method we need to use static keyword while defining a method like

public static void printHello() {

 System.out.println("Hello");

}

/*

 * A non static method can access static variable of a class there is no issue

 * with that we can use a static variable in a non static method like

 */

public void printI() {

 System.out.println(i);

}

/*

 * As long as the class exist in JVM static variables will be there, as static

 * variable belong to class not with the instance,

 * it does not matters if there are instance exist or not

 */

}

4 0
3 years ago
Other questions:
  • Assume the availability of a function called printStars. The function receives an integer value as an argument. If the argument
    8·1 answer
  • Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
    7·1 answer
  • Using C++.
    7·1 answer
  • Define the following Window class:
    6·1 answer
  • How will computing change our world?
    8·1 answer
  • A technician is working at a client's office after hours and needs two cables to finish the work but does not have immediate acc
    7·1 answer
  • Susan teaches many individuals and business professionals how, why, and the benefits and challenges to using social media. Of th
    15·1 answer
  • What are the core components of a computer system?
    14·1 answer
  • Which tab allows you to review the slideshow timings?<br> O Home<br> O View<br> O Review<br> O File
    7·1 answer
  • Sql injections is an attack in which __ code is inserted into strings that are later passed to an instance of sql server.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!