1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
3 years ago
15

What is an equation of the line that passes through th e points (-2,-7) and (-1,-3)

Computers and Technology
1 answer:
Leokris [45]3 years ago
8 0

Answer:

y=4x+1

Explanation:

You might be interested in
Which number is equivalent to 3e-2?<br> 3<br> 0.3<br> O 30<br> my<br> 0.03
Ipatiy [6.2K]

Answer:

0.03

Explanation:

4 0
3 years ago
The physical layer of the OSI model is not foundational to any of the other layers. True or False
galina1969 [7]

Answer:

False.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

The physical layer of the OSI model is the first layer of the OSI model and it is foundational to any of the other layers because it determines the means of transmitting (sending) raw bits from one network node to another and the electrical specification of network equipments.

5 0
3 years ago
This algorithm requires you to find the perimeter of 12 different squares.
k0ka [10]

Answer:

BEGIN

SET count = 1

WHILE count <= 12 THEN

     INPUT length

     perimeter = length * length

     PRINT perimeter

END WHILE

END

Explanation:

You can also set count to 0 and in while loop use count < 12 to loop just 12 times just as above

4 0
3 years ago
How many host addresses are needed in the largest required subnet?
prohojiy [21]
<span>The subnet is a logical subdivision of an IP network</span><span>
There are 25 host addresses needed in the largest required subnet.
</span>To subnet a network, bits from the host portion of the original network mask are changed into subnet <span>bits. The number of subnet bits borrowed from the host portion defines the number of subnets.
</span>
3 0
3 years ago
Given a link with a maximum transmission rate of 28.1 Mbps. Only two computers, X and Y, wish to transmit starting at time t = 0
Sophie [7]

Answer:

0.36

Explanation:

Each Packet Size = 1024 bytes (1000 bytes + 24 bytes)

X gets the transmission first.

Number of packets X has to send = 10,000,000 / 1,000 = 10,000 packets.

Number of packets Y has to send = 14,000 / 1,000 = 14 packets.

Time for one packet to transmit:

28,100,000 bytes in 1 sec

1,024 bytes in = (1/28,100,000) * 1,024 = 0.00003644 secs.

Time taken for X to send = 10,000 * 0.00003644 = 0.3644 secs

Time taken for Y to send = 14 * 0.00003644 = 0.00051016 secs

Time at which File x would finish transmitting = 0.3644 + 0.00051016 = 0.36

Hope this helps!

4 0
3 years ago
Other questions:
  • Peter accumulated many photos from his visit to Wisconsin. He wants to upload these photos to a social networking site. Which fi
    12·1 answer
  • In object-oriented development, why is it necessary to use drivers and stubs in testing?
    9·1 answer
  • Students who respond promptly to e-mails are following which netiquette rule?
    13·2 answers
  • Discuss trends in cellular data transmission speeds
    15·2 answers
  • _____emphasizes on proper breathing and the mind-body-spirit connections.​
    6·2 answers
  • What is the most common representation of a distribution?
    14·1 answer
  • In python, what is the difference between a dictionary and a set? How are they similar?
    11·1 answer
  • A vpn is used primarily for which purpose?
    10·1 answer
  • Toni is reviewing the status of his organization's defenses against a breach of their file server. He believes that a compromise
    14·1 answer
  • What type of os must be installed on your machine to allow this type of action by another person?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!