1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dangina [55]
3 years ago
14

Tìm hiểu về đặc điểm của tài liệu kỹ thuật.

Computers and Technology
1 answer:
JulsSmile [24]3 years ago
3 0

Jupiter Saturn Mars Earth Sun

You might be interested in
Describe the inter-relation and linkage in between traditional knowledge, indigenous knowledge and modern technology.​
xz_007 [3.2K]
Traditional knowledge is knowledgeable u know
5 0
3 years ago
Let's assume that the smallest possible message is 64 bytes (including the 33-byte overhead). if we use 100base-t, how long (in
Ostrovityanka [42]

As we know that 10-bAse data travels at the rate of 10 mbps, therefore at 1 sec we have 10240 bytes.

We have to calculate for 64 bytes travelling in one second. Multiply both sides by 64.

64 sec = 10240 x 64 bytes

64 bytes = 64 / 10240 sec

Now we have to calculate for light of speed

1 sec = 186000 miles

Substitute this value to the formula above

64 bytes = 64 / 10240 x 1 sec = 64 / 10240 x 186000 miles = 64 / 10240 x 186000 x 5280 feet = 6138x10^3 feet

Therefore, 64 bytes is equal to 6138 x 10^3 feet long message

3 0
3 years ago
For which product would the producer keep a high profit margin and offer after-sales service?
Zina [86]

What are the products?

6 0
4 years ago
Using-R,-create-a-linear-model-to-represent-the-coefficients-for-the-objects-fw2-and-fwe-data..
Leokris [45]

Answer:

moto moto

hee hee scooby dooby doo

Explanation:

7 0
3 years ago
Which part of the computer stores and processes data?
lilavasa [31]

it is A the hardware im pretty sure but dont put my answer in im not completley sure

3 0
3 years ago
Other questions:
  • A computer hacker usually gets into a companyâs network by _____.
    15·1 answer
  • Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a sy
    13·1 answer
  • What should a consultant recommend to meet this requirement?Universal containers assign its contact center agents to certain int
    12·1 answer
  • Write a program using integers userNum and x as input, and output userNum divided by x three times.
    11·1 answer
  • Which of the following factors will have the greatest impact on your credit score? I. Length of Credit History II. Payment Histo
    6·2 answers
  • hãy lựa chọn một doanh nghiệp kinh doanh theo loại hình siêu thị việt nam em hãy tìm hiểu doanh nghiệp và thực hiện theo yêu cầu
    10·1 answer
  • 5. Describe the concept behind a digital signature and explain how it relates to cybersecurity by providing a hypothetical examp
    6·1 answer
  • Draw algorithm and flowchart of multiply A and B​
    10·1 answer
  • I need help solving this problem on Picoctf. The question is What happens if you have a small exponent? There is a twist though,
    7·1 answer
  • How many pages is 1500 words double spaced 12pt font?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!