1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
3 years ago
7

Which of the following is not a use of a hash function

Computers and Technology
1 answer:
soldi70 [24.7K]3 years ago
7 0

Answer:

the answer would be there

Explanation:

You might be interested in
Look at the picture, list down the things you must do to make it more organize​
Oxana [17]

Answer:

The electrical cable

Explanation:

The most dangerous is the electrical cable to be organised as much as you can as in case any damage or not double insulation could cause a harm to the people.

7 0
3 years ago
A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet in
Vesnalui [34]

Answer:

d. 65536

Explanation:

When the network administrator received the IPV6 prefix for subnetting and we have assumed that the administrator does not subnet into their interface ID portion.So the number of subnets the administrator can create from the /48 prefix are 65536.

Hence the answer to this question is 65536.

3 0
3 years ago
You have created a new storage space using a single 500 GB external USB 3.0 drive. The drive is becoming full, so you add anothe
Dimas [21]

Answer:

In the clarification section following, the definition including its query is mentioned.

Explanation:

  • I believe we possess 2 other discs except for the major memory card-a USB 500 GB USB 3.0 drive, just one TB USB 2.0 drive. So we're making a two-array mirrored storage space resilience kit. We get a warning when we duplicate files from either the C: drive towards this second adaptation that you should be running out of places.
  • That was because these need to have a backup process around each other discs throughout the situation of a two-way mirror.
  • This serves to protect the organization from disc failure and enhances the overall efficiency of the device. Thus, even when copying, even though only several 100 MB has also been cut and pasted to something like the disc, the disc intercepts that the information collected from either the 500 GB drive as well as the major disc must be stored there. And that is how the alert arrives that throughout the new trip, we're running out of space. So this is how they so easily get the alarm.

3 0
3 years ago
What is the internet​
ZanzabumX [31]
<h2>♨ANSWER♥</h2>

The Internet, sometimes called simply "the Net," is a worldwide system of computer networks -- a network of networks in which users at any one computer can, if they have permission, get information from any other computer

<u>☆</u><u>.</u><u>.</u><u>.</u><u>hope this helps</u><u>.</u><u>.</u><u>.</u><u>☆</u>

_♡_<em>mashi</em>_♡_

5 0
2 years ago
Read 2 more answers
What do you call the process of translating statements written by a developer? What is the result of this process?
professor190 [17]

Answer:

The translator is the software that is called to translate the statement written by the developer and the result of the process is machine code which can be understood by the computer system.

Explanation:

  • A translator is a software or processor which is responsible to convert the code into machine-executable language or machine code or binary language. This language is made up of 0 and 1.
  • There are so many translators which are specific for any particular language. For example assembler and compiler.
  • The above question wants to ask about the process which is used for translating a statement written by a developer which is a translator and the result of this process is machine code which is understood by the computer system.
6 0
3 years ago
Other questions:
  • This solution will use an item quantity and a state code to calculate the total price of an item. The solution will calculate th
    10·1 answer
  • Ron wants to install an energy efficient and long lasting device for lighting in his new home. Which device should he use?
    11·2 answers
  • Insurance can help you:
    10·1 answer
  • In a formatted text file, ________ signal(s) the beginning and end of a formatting command.
    12·1 answer
  • Which unique address is a 128-bit address written in hexadecimal?
    13·1 answer
  • Which of the following is the best subject line for an e-mail sent to co-workers about rescheduling a team meeting? A. Reschedul
    12·2 answers
  • Which technological innovation was most important for early-nineteenth-century economic development?
    11·1 answer
  • Explain briefly what would happen if marketing research is not conducted before a product is developed and produced for sale.
    14·1 answer
  • Which group of Indians was native to Roanoke and not very friendly?
    14·2 answers
  • 1. Give one reason why data is represented in binary in a computer [1]
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!