1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
3 years ago
15

7. Which computer network is better to use for a computer lab? L.A.N or W.A.N? State why you chose your answer.

Computers and Technology
1 answer:
Readme [11.4K]3 years ago
7 0

Answer :This is a sort of computer network services that are utilized for giving internet access. Devices like, modems and switch are required by the specialists to build up a WAN. WAN uses layer 2 Ethernet, fiber optics, and others for the connection. 4. Wireless Local Area Network:  ̄へ ̄

Explanation:

You might be interested in
Gary has to complete a form before enrolling into an online course. A few of the fields require Gary to respond with either a "Y
zalisa [80]
I think its C. Boolean
Hope this helped!
3 0
3 years ago
Read 2 more answers
why is it important for you to understand and describe the internal and external components of a computer in the workplace​
zhannawk [14.2K]

Hi! I have been troubleshooting and building PCs all my life and I find it very important to know the the internal core components of a PC and how they function that way when errors occur you can attempt to fix the problem.

Ex1: Lets say your BIOS identifies a problem with a RAM slot you would be able to know that your RAM slot is either shorted or there is a problem with the RAM stick you inserted.

Ex2: Now your monitor is flashing and turning colors randomly. You could make an inference that either your monitor is prongs are broken, your cable prongs could be bent, your cable might not be plugged in all the way, or your external or integrated GPU is toast.

Hope this might've showed you something

Aaron

7 0
3 years ago
How many bits can a memory chip with the below configuration support? For full credit, show how you got the answer.
tatiyna

Answer:

Total Memory= 4 KB = 4096 bytes = 32768 bits

Explanation:

<em><u>1. Data lines are 8 From D0 to D7</u></em>

so

Total memory at single address locations is 8 bits.

<em><u>2. Address lines are 12 (A0 to A11)</u></em>

There are 12 address lines but 3 out 12 are for selction of chip or memory bank.

so only 9 pins are there to address the locations on one chip.

Total No. of address locations on single chip = 2^9 = 512 locations

as 1 location is 1 byte so total memory of single chip is 512 bytes.

<u><em>3. Total Memory Bank </em></u>

There are total 3 selection pins for memory bank.

so

Total chips = 2^3 = 8.

<em><u>4. Total Memory </u></em>

Total size of 1 chip = 512 bytes

Total size of 8 chip = 8x512 bytes = 4096 bytes = 4096/1024 kb = 4 kb

<em>So total memory of system is 4 Kb = 4096 bytes = 32768 bits</em>

5 0
3 years ago
What two technologies below are hybrid processors that can handle 32 bit and 64 bit operating systems natively?
Vitek1552 [10]
For the answer to the question above asking <span>What two technologies below are hybrid processors that can handle 32 bit and 64 bit operating systems natively?
I believe the answer here is Intel and AMD (Advance Micro Devices)
I hope my answer helped you.</span>
4 0
3 years ago
Without exception, you must always stop when ______________.
Rina8888 [55]
It would be much better if you've provided additional information, as it's not clear what your question is about. Anyway, I've found this question with options.
And the answer is Without exception, you must always stop when <span> A traffic officer instructs you to stop</span>.
7 0
3 years ago
Other questions:
  • What view is In a presentation program displays your slides in full screen mode
    6·1 answer
  • ORANGE COLORED SIGNS AND FLAGS MEAN THAT YOU MUST BE ALERT FOR:
    8·2 answers
  • The while loop is a pre-test loop? TRUE OR FALSE
    9·2 answers
  • What is the main characteristic of a Peer-to-Peer (P2P) network?
    8·1 answer
  • What type of things can be marketed
    11·1 answer
  • 7.
    15·1 answer
  • Which of these is not a valid form<br>layout in Microsoft Access?​
    11·1 answer
  • Which is an advantage of using a flat file instead of a relational database?
    9·1 answer
  • 1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
    12·1 answer
  • Which type of evidence should victims collect to help officials catch cyber bullies?home addressesbirthdayssocial media username
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!