1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igor_vitrenko [27]
3 years ago
5

Which of the following must an

Computers and Technology
1 answer:
KonstantinChe [14]3 years ago
7 0

Answer:

the answer to the question should be b

You might be interested in
Convert the following binary to decimal number . <br>a). 101101 ​
KonstantinChe [14]
First things first you have to do write it down which you did
step 2: then you multiply each digit of the binary number by the corresponding power of 2: 1x25 + 0x24 + 1x23 + 1x22 + 0x21 + 1x2 0
step 3: solve the powers: 1x32 + 0x16 + 1x8 + 1x4 + 0x2 + 1x1 = 32 + 0 + 8 + 4 + 0 + 1
step 4: add the numbers written above

32 + 0 + 8 + 4 + 0 + 1 = 45.
So, 45 is the decimal equivalent of the binary number 101101.
5 0
2 years ago
Read 2 more answers
You want to make it possible for your smartphone to share its internet access wirelessly with your friends device which of the f
IrinaVladis [17]

Answer:WiFi or hotspots

Explanation:you will have to turn on your WiFi or hotspots on your smart phone and allow your friend to also turn his WiFi or hotspot after you will search for your WiFi and connect there he can use the internet

6 0
3 years ago
What is the boundary folding method?
Romashka [77]

Answer:

 Boundary folding method is basically used in the java algorithm and in the hash table. In the hash function, the left and the right value are basically folded in the fixed boundary between the given center values by using the boundary folding methods.

There are basically two types of folding method in the hashing that are:

  • Folding shift
  • Folding boundary

In the folding boundary method the outside value are get reversed and the alternate values are get flipped at the boundary folding method.

4 0
4 years ago
A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate is known a
Pavel [41]

Answer:

Certificate Signing Request(CSR).

Explanation:

Certificate Signing Request(CSR):- It is a message that is specially encrypted Which validates the information that is required by CA for the issuing of a digital certificate.

It is the first step towards getting your own SSL certificate.

So we conclude that the answer to this question is Certificate Signing Request (CSR).

5 0
3 years ago
In this problem, you will write three methods to:
gulaghasi [49]

Answer:

see explaination for program code

Explanation:

program code below:

class Names{

public static String[] makeNames(String[] array1, String[] array2){

if(array1.length == 0) return array2;

if(array2.length == 0) return array1;

String[] res = new String[array1.length*array2.length];

int k = 0;

for(int i=0;i<array1.length;i++){

for(int j=0;j<array2.length;j++){

res[k++] = array1[i] + " " + array2[j];

}

}

return res;

}

public static String[] makeNames(String[] array1, String[] array2, String[] array3){

return makeNames(makeNames(array1, array2), array3);

}

public static void print(String[] array){

for(String name : array){

System.out.println(name);

}

}

public static void main(String[] args) {

String[] first = {"David", "Mike", "Katie", "Lucy"};

String[] middle = {"A","B", "C", "D", "E"};

String[] last = {};

String[] names = makeNames(first, middle, last);

print(names);

print(names);

}

}

8 0
3 years ago
Other questions:
  • What are the core scripting and coding technolies used to build ai platforms?
    14·1 answer
  • The Apple II is an IBM-compatible PC "clone".<br> True?<br> False?
    10·1 answer
  • Round-robin schedulers normally maintain a list of all runnable processes, with each process occurring exactly once in the list.
    14·1 answer
  • PLEASE HELP POWER POINT:
    8·2 answers
  • If your BAL is .10 you can expect a _______ drop in complex performance compared to the sober level
    6·1 answer
  • What is the safest way to install a new flash drive
    7·2 answers
  • Where could an identity thief access your personal information?
    13·1 answer
  • What will be the value of “sumtotal” when this code is executed?
    6·1 answer
  • The words that follow a code number in the cpt manual are called the
    12·1 answer
  • 5. Write the name of the tab, command group, and icon you need to use to access the
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!