1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DanielleElmas [232]
3 years ago
12

Amogus :0) owo have a good day y'all

Computers and Technology
1 answer:
prohojiy [21]3 years ago
4 0

Answer:ghSlijhavicdhavghcugsadhsfghsa

Explanation:

You might be interested in
Suppose the inventory is unordered (!) and a sequential search is done to locate a specific artifact. Given that the search is e
lana [24]

Answer:

The computer can do 12000 searches per second. Suppose there are 60000 inventory items. And we need to search one item from it in a sequential manner. The computer can do 12000 searches in one second. Hence it can search in a list of 60000 inventory in 5 seconds, as 12000 x 5 =60000 searches, in the worst case. And if the item is below 12000 on the list, it will take less than 1 second(1/12000 sec in best case), and so on.

And if we assume that the list is sorted, and perform a binary search. then in the worst case, the number of searches required in the worst case will be 60000/2= 30000. And the time required will be 30000/12000= 5/2=2.5 seconds, and (1/24000) seconds in the best case. Its 1/24000 as its binary search.

Explanation:

Please check the answer section.

6 0
3 years ago
A student is going to give a multimedia presentation comparing the novel The Wizard of Oz by L. Frank Baum to the 1939 movie ver
Alekssandra [29.7K]

Answer:

C.

Explanation:

A line graph can show how both the movie and the novel are compared to each other. It can give a visual of both mediums of the story rather than one or the other. Hope this helped :)

3 0
3 years ago
Read 2 more answers
Which of the following expressions shows the correct amount of sales tax for the computer at Store A? Select all that apply.
Anastasy [175]

Answer:

6%($1,200)  0.06($1,200)  3/50($1,200)

Explanation:

hope this helps sorry if i am wrong

have a nice day

6 0
4 years ago
Read 2 more answers
Select all True statements! Question 1 options: a) Host A is sending Host B a large file over a TCP connection. Assume Host B ha
VikaD [51]

<u>Solution:</u>

a)   False. Piggyback is used only for efficiency. If there's no data packet to be piggybacked to, then B will just send the acknowledgement packet.

b)  False. It is the size of the receiver's buffer that's never changed. RcvWindow is the part of the receiver's buffer that's changing all the time depending on the processing capability at the receiver's side and the network traffic.

c)  The given statement is True.

 d) False. The sequence number of the subsequent segment depends on the number of 8-byte characters in the current segment.

e)  True. Every TCP segment has a current value of rwnd in the receive window.

f)  False. Next_RTT = alpha * last_estimated_RTT + (1-alpha)*newly_collected_RTT_sample. In this case even though the last sampleRTT which is the newly_collected_RTT_sample is 1sec, the next_RTT still depends on alpha and last_estimated_RTT. Therefore, the next_RTT is not necessarily greater than 1sec.

g) False. The acknowledgement number has nothing to do with the sequence number. The ack. number indicates the next sequence number A is expecting from B.

5 0
4 years ago
Which of the following statements about an RFID active tag is true? Group of answer choices They are inexpensive, with the start
sladkih [1.3K]

Answer:

They have an internal battery source.

Explanation:

Active RFID systems use battery-powered RFID tags that continuously broadcast their own signal. Active RFID tags are commonly used as “beacons” to accurately track the real-time location of assets or in high-speed environments such as tolling. Active tags provide a much longer read range than passive tags. This makes them much more expensive.

6 0
3 years ago
Other questions:
  • Read the excerpt below and answer the question.
    14·1 answer
  • Which protocol below is used by email clients to send email
    8·1 answer
  • Which of the following is the shortcut key combination for pasting copied text?
    7·2 answers
  • A network technician is setting up a web server for a small company. The company has obtained a domain name, company-a, from a d
    11·1 answer
  • If I wanna records a game and my voice need to be in the video what app I download.
    7·2 answers
  • The uncial letter, originally invented by the Greeks, was drafted on four guidelines. It was the basis of our lower case letters
    11·1 answer
  • As your textbook explains, Wikipedia is usually the only source you need when
    8·1 answer
  • Fill up the blank:- The picture that graphically represents the items you use in Windows is called a/an .......
    5·1 answer
  • Write a for loop to print the numbers from 20 to 30, inclusive (this means it should include both the 20 and 30). The output sho
    5·1 answer
  • Create a defined name for range b6:e6 using walkup as the range name
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!