1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lostsunrise [7]
3 years ago
9

Revisa un manual o instructivo de las maquinas o aparatos tecnologicos que tengas en tu casa. Luego, trata de encontrar algunas

caracteristicas comunes entre las representaciones técnicas empleadas y describelas. Si es necesario, usa texto y simbolos.​
Computers and Technology
1 answer:
ki77a [65]3 years ago
7 0

Answer:

which language is these can you explain

You might be interested in
Which of the following forces all traffic, communications, and activities through a single pathway or channel that can be used t
Ad libitum [116K]

Answer:

Option b. Choke point

Explanation:

In firewall, a choke point can be defined as a single point which allows all of the network traffic including incoming and outgoing to be funneled. As the passage of the whole traffic through the choke point regulates the flow as it focus monitoring  and controls bandwidth consumption, provides authentication, control efforts like Internet firewalls.

7 0
3 years ago
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
NNADVOKAT [17]

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
3 0
3 years ago
Is the address 7b invalid regarding cell references?
Lubov Fominskaja [6]

Answer:

It is not valid

Explanation:

I'll assume the question relates to cell referencing in Microsoft Excel.

To reference a cell in Excel, we make use of the following steps:

  • Write out the cell column name first
  • Followed by the row number

7b implies that, the row number first, followed by the column name; this doesn't follow the naming convention of cells.

Hence, 7b is invalid.

3 0
3 years ago
Why is image compression an important part of vidoetechnology?
OLEGan [10]

Answer: Image compression is the technique which is responsible for the reduction in the size of the image according to the need of the video technology. Image compression is done because of the following reasons:-

  • Makes more space for the storage and creates space.
  • It also reduces the time that is used up for the uploading of the video through internet.
  • Text, labels etc might also be needed to inserted along with the image .

4 0
3 years ago
Leo is in charge of advertising for the clothing lines of a large manufacturer. He uses his Google Ads Recommendations page to h
Sever21 [200]
D is the correct answer
4 0
4 years ago
Other questions:
  • If an application written for an earlier version of Windows doesn't run correctly the operating system can emulate its own older
    5·1 answer
  • If you use the ___ template, as opposed to a formatted theme, you must make all design decisions?
    15·1 answer
  • What is an (CR) Optical character recognition?
    13·2 answers
  • Janice usually works on a particular workbook that contains all business related data. She decides to keep a backup of all the d
    7·2 answers
  • Why is it important to use random assignment when determining which research participants will comprise the different treatment
    12·1 answer
  • Part 2: a) Write VHDL code for a top module that invokes necessary components to display the four decimal digits on four seven-s
    5·1 answer
  • What is the purpose of the GETPIVOTDATA function?
    13·2 answers
  • Three materials needed to stream video video content
    10·2 answers
  • 6
    14·1 answer
  • How do I write this code in java? input "Enter Your Age to Order a Beer"
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!