1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentina_108 [34]
3 years ago
5

When streaming video, data is temporarily stored in a

Computers and Technology
2 answers:
Ludmilka [50]3 years ago
8 0

Answer:

>:M -------------------------Quackenator is backbaby!!!!!!!!!!!

Explanation:

dangina [55]3 years ago
6 0

Answer:

hey,ik this isnt the answer,but we talked yesterday. my acct got deleted,so i had to make a new one.

Explanation:

You might be interested in
Expalin the defference between the driver of a desktop and a laptop​
Pani-rosa [81]

Answer:

None, drivers are hardware specific, if both devices share the same hadware manufacurer they tend to have the same drivers.

A driver is a software component that lets the operating system and a device communicate with each other. So asking for a difference in drivers is as asking the difference in hardware in both devices, though one tends to be more intergrated they are all the same in low level functions

Also drivers might not even communicate directly with the device but send a request. thats why some drivers can be written directly into an operating system.

7 0
3 years ago
Which tag you will use to explain a set of in an HTML document?
Ahat [919]

Answer:

<p> </p>

Explanation:

3 0
4 years ago
What is a credit limit? athe required payment to your credit card company. bthe amount of interest you are charged each month. c
Gnom [1K]
I believe the correct answer from the choices listed above is option C. A credit limit is the maximum amount you can charge each billing cycle.  <span>The </span>credit limit<span> on your credit card is the maximum balance your credit card issuer allows. Hope this answers the question.</span>
4 0
4 years ago
modern managed cloud service providers will often use secure keyboard/video/mouse (kvm) devices within their data centers. these
professor190 [17]

A cloud service providers uses KVM in their data centers because they are gravely concerned with insider threats.

KVM is a system for management, monitoring and control of a data center environment from a central location. In the data center this system is very necessary because the data center has multiple servers and computers. With this system the server can be connected and controlled from a remote location. This includes mapping the physical locations of accessible virtual drives.

Your question is incomplete, but most probably you full question was:

Modern managed cloud service providers will often use secure Keyboard/Video/Mouse (KVM) devices within their data centers. these devices are extremely expensive compared to their non-secured counterparts. which of the following is one of the reasons cloud service providers do this?

  • They have plenty of revenue and can afford it
  • They are gravely concerned with insider threats
  • Cloud data centers need very few of these devices
  • Managed cloud providers often manufacture their own devices as well

Learn more about servers brainly.com/question/27960093

#SPJ4

7 0
1 year ago
From the binary search algorithm, it follows that every iteration of the while loop cuts the size of the search list by half.
Colt1911 [192]

Answer:

True: In binary search algorithm, we follow the below steps sequentially:

Input: A sorted array  B[1,2,...n] of n items and one item x to be searched.

Output: The index of x in B if exists in B, 0 otherwise.

  1. low=1
  2. high=n
  3. while( low < high )
  4.  {      mid=low + (high-low)/2
  5.         if( B[mid]==x)
  6.          {
  7.             return(mid)  //returns mid as the index of x
  8.           }
  9.          else
  10.          {
  11.              if( B[mid] < x)      //takes only right half of the array
  12.               {
  13.                 low=mid+1
  14.               }
  15.              else               // takes only the left half of the array
  16.               {
  17.                high=mid-1
  18.               }
  19.           }
  20.  }
  21. return( 0 )

Explanation:

For each iteration the line number 11 or line number 15 will be executed.

Both lines, cut the array size to half of it and takes as the input for next iteration.

6 0
4 years ago
Other questions:
  • Case Project 10-1 As the network administrator for a growing company, you’re asked to solve a remote access dilemma. The 12 empl
    8·1 answer
  • Consider the formula: G=D+(A+C^2)*E/(D+B)^3 Show the order that a processor would follow to calculate G. To do so, break down th
    10·1 answer
  • token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle netw
    6·1 answer
  • You work part time at a computer repair store. You are in the process of building a new computer system. The customer wants a mo
    6·1 answer
  • Match the term to the correct definition.
    6·1 answer
  • How would you reply to an email message you've received that has multiple recipients, all of whom you would like to see your rep
    6·2 answers
  • Can someone please help me answer this I can’t fail. tysm :)
    8·1 answer
  • User name ideas for ro blox? I'm changing mine and I dont know what I want. No numbers or underscores!
    10·2 answers
  • What is an example of content?
    7·1 answer
  • How does a file reader know where one line starts and another ends?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!