1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
2 years ago
12

Give atleast 5 example of ENFRAMING in our daily lives

Computers and Technology
2 answers:
ddd [48]2 years ago
8 0

Answer:

1. steel is produced to be used in such things as the production of automobiles, and, although steel is not the automobile, it is, nevertheless, affected by the “coming into being” of the automobile.

Scrat [10]2 years ago
6 0

For example, steel is produced to be used in such things as the production of automobiles, and, although steel is not the automobile, it is, nevertheless, affected by the “coming into being” of the automobile.

You might be interested in
What is sum after the following loop terminates? int sum = 0; int item = 0; do { item ; sum = item; if (sum > 4) break; } whi
irinina [24]
Int sum = 0;
int item = 0;
do
{
    item;
    sum = item;
    if (sum > 4)
        break;
} while (item < 5);


You will generate a compile error, as having (item;) as a statement on its own is invalid.
8 0
3 years ago
Read 2 more answers
What does Verizon child allow parents to do? My parents recently got the app and put it on my phone so I was wondering...
HACTEHA [7]
It allows them to turn on and turn off your internet; also if you were wondering incognito or any private browsing still countermeasures all devises they can use to access your history
4 0
3 years ago
Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the
ira [324]
  • The subnet mask would be a 32-bit integer which is formed by assigning the host bits to all 0's and the networking bits to so many 1's.
  • In this method, the subnetting separates the IP address between host and network addresses.
  • The subnet mask covers an IP address with its 32-bit number, thus the term "mask".

Given:

Network IP address \bold{= 172.149.254.0 /24}

Subnet numbers \bold{= 13}

Calculating the borrow bits:

\to  \bold{= ceil(\log_{2} 13) = 4 \ bits}

a)

Calculating the dotted decimal value for the subnet mask:

\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\

b)

The additional bits which will be needed to mask the subnet mask that is = 4.

Learn more: brainly.com/question/2254014

4 0
3 years ago
Name two components required for wireless networking<br>(answer fastly)​
Luden [163]

Explanation:

User Devices. Users of wireless LANs operate a multitude of devices, such as PCs, laptops, and PDAs. ...

Radio NICs. A major part of a wireless LAN includes a radio NIC that operates within the computer device and provides wireless connectivity.

or routers, repeaters, and access points

5 0
2 years ago
How might your use of computers and knowledge of technology systems affect your personal and professional success?
Xelga [282]
Amost all professions include theuse of computers. Knowing a lot about them and the way they work could help you use them when needed in a work environment. It would also make an employer more likely to hire you.
6 0
3 years ago
Read 2 more answers
Other questions:
  • To add and remove chart elements, you can use the add chart element button in the charts layout group on the ____ tab.
    6·1 answer
  • An outline is most like which of the following?
    7·1 answer
  • Interest rate risks would be most relevant to what purchase?
    7·2 answers
  • Which is NOT a benefit of using visual aids?
    9·2 answers
  • Which of the following is a sample IPv4 address?
    14·1 answer
  • How are web design &amp; web development different from each other?
    9·1 answer
  • Computer programming 3
    13·1 answer
  • Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devi
    7·1 answer
  • Which wireless standard uses the 2.4 GHz frequency band only?
    5·1 answer
  • Write a python program to change variable value of your previous result percentage to your current percentage of mid-term
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!