1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
3 years ago
5

Insertion point shows where the typed text will appear.

Computers and Technology
1 answer:
Slav-nsk [51]3 years ago
3 0
The correct answer is true :)
You might be interested in
Small data files that are deposited on a user's hard disk when they visit a website are called _______.
IrinaK [193]
The answer is cookies
7 0
3 years ago
Read 2 more answers
Consider a bit stuffing framing method where the start of a frame is indicated by 6 consecutive ones, followed by 2 zeroes. What
Anastaziya [24]

Answer:

Explanation:

Bit stuffing Framing Method

In the given situation, the beginning casing is shown by 6 sequential ones followed by 2 zeroes.

The beginning casings are generally known as the flags.which are utilized for demonstrating the beginning and end of the edges. Essentially utilized for the synchronization between the sender and the reciever.

Along these lines here the beginning and end banners are 11111100(this is on the grounds that the end banner is same as the beginning banner).

To enable us understand how this question plays out, let us understand the rule for Stuffing and De-stuffing .

The standard for stuffing is :

At whatever point there are 5 successive ones supplement one zero in the casing which is an information. The embedded zero piece is known as the stuffed bit.The principle reason behind stuffing somewhat after 5 back to back ones is to evade the distortion of information (data) as flag. If the reciever misconstrues the information as end banner then he would quit recieving the information where the entire information sent by the sender will be left and lost causing an error-prone information.

The rule for destuffing :

The standard/rule for destuffing is only inverse as stuffing. After recieving the bitstuffed information (data), at the reciever's end zero after each 5 continuous ones will be evacuated and the rest of the information will be considered as the genuine information.

In the given situation, the beginning casing is demonstrated by 6 back to back ones followed by 2 zeroes.

the beginning casings are normally known as the flags.which are utilized for showing the beginning and end of the edges. Essentially utilized for the synchronization between the sender and the receiver.

In this way here the beginning and end banners are 11111100(this is on the grounds that the end banner is same as the beginning banner).

  • data before bit stuffing is:  011111100011111101
  • the stream after stuffing would be: 011111<u>0</u>10001111<u>0</u>1101

where the bolded/underlined digits represents the stuffed bits

cheers i hope this helps

3 0
3 years ago
One modeling technique drawn from systems analysis and design that can provide an excellent way to illustrate how a business fun
stealth61 [152]

Answer:

collaboration diagram

Explanation:

Collaboration diagram -

It refers to the diagram , which showcase the link between the unified modeling language with the software object , is referred to as the collaboration diagram.

It is also called the communication diagram .

These diagram are very important for a company as it is the  pictorial representation.

Various software are used to make these diagrams.

5 0
3 years ago
Question #4
Nataliya [291]
A is your answer.............
3 0
3 years ago
Value or power of a network grows exponentially as a function of the number of network members. this is known as ________ law.
mel-nik [20]
Value or power of a network grows exponentially as a function of the number of network members. this is known as Metcalfe's law. According to this law <span>the value (the power) of a </span>telecommunications network<span> is </span>proportional to the square of the number of connected users of the system (network members). Metcalfe's Law <span>characterizes many of the </span>network effects<span> of communication technologies and networks such as the </span>Internet<span>, </span>social networking<span> and the </span>World Wide Web<span>.</span> 
6 0
3 years ago
Other questions:
  • Why do nonprofit agencies often include blogs on their websites?
    5·1 answer
  • When the print server processes documents waiting in the queue until the print device is available to accept the print job is ca
    14·1 answer
  • An IT company revises its process parameters in response to complaints from vendors that products were not ready on time. This w
    15·1 answer
  • Why is statistics important for business professionals in many career fields?
    13·2 answers
  • HELP!! TIMED TEST!! Match the item to its description. 1. icons place where frequently used programs can be opened 2. Quick Laun
    13·1 answer
  • Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are
    9·1 answer
  • Which of these is an example of input?
    6·1 answer
  • ¿Cuál es la diferencia entre una plataforma educativa y una tutoría?
    7·1 answer
  • Why is it important to prevent financial loss
    7·1 answer
  • Harry needs to make a presentation on packaging prototypes for a new product. Which presentation software elements can be use to
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!