1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
3 years ago
6

Pls help me to answer this question ASAP

Computers and Technology
1 answer:
mariarad [96]3 years ago
7 0
It’s about yourself. Answer the questions on how you’ve been experiencing them in your life
You might be interested in
If a packet gets "sucked down a black hole" (figuratively speaking) and is not received by its sender, and no message is sent ba
Serga [27]

Answer:

iso

Explanation:

3 0
3 years ago
Give a recursive algorithm to compute the sum of the cubes of the first n positive integers. The input to the algorithm is a pos
DaniilM [7]

Answer:

def sum_cubes(n):

   if n == 1:

       return 1

   else:

       return n * n * n + sum_cubes(n-1)

print(sum_cubes(3))

Explanation:

Create a function called sum_cubes that takes one parameter, n

If n is equal to 1, return 1. Otherwise, calculate the cube of n, and add it to the sum_cubes function with parameter n-1

If we want to calculate the cubes of the first 3 numbers:

sum_cubes(3) = 3*3*3 + sum_cubes(2)

sum_cubes(2) = 2*2*2 + sum_cubes(1)

sum_cubes(1) = 1

If you substitute the values from the bottom, you get 27+8+1 = 36

7 0
3 years ago
In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the
Scilla [17]

Answer:

Process

Explanation:

In older systems, the user interface mainly consisted of process-control screens that allowed a user to send commands to the system. These systems were used in a great variety of industries, and it gave the user control over process measurements or process variables. It also allowed the user to view the current state of the process, modify the operation of the process, and perform other related actions.

6 0
4 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
Which of the following translates packets so that the node can understand them once they enter through a port?
FinnZ [79.3K]
A cluster compute server includes nodes coupled in a network ... Each VNIC typically is assigned its own MAC address by the VMM or VM, ... translation or mapping storage at the NIC of each node in the cluster ...... a wired or wireless network (e.g., network accessible storage (NAS)). .... Google Translate ...
5 0
4 years ago
Read 2 more answers
Other questions:
  • Which change signaled a musical progression toward rock and roll?
    14·1 answer
  • Which of the following is a useful policy to minimize waste and mistakes?
    6·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    9·1 answer
  • Which of the following sentences uses correct punctuation? A. I am a good communicator, and I am a strong team member. B. I comm
    12·2 answers
  • Type in computer code for Sonic the Hedgehog, does it look weird yes or no
    15·1 answer
  • Select the correct answer.
    14·1 answer
  • Although plants and ainamals are both living things___
    13·1 answer
  • Why is experience in their own factory setting
    13·1 answer
  • A(n) _____ is a computerized system by which subscribers are able to communicate to all other subscribers by sending a transmiss
    5·1 answer
  • What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!