1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svp [43]
2 years ago
13

Choose the answer.

Computers and Technology
2 answers:
kobusy [5.1K]2 years ago
5 0
Router is the answer
Alik [6]2 years ago
3 0
A home network aswell business networking would use a Router to connect the lam and internet all together
You might be interested in
Give a pseudo-code description of the O(n)-time algorithm for computing the power function p(x,n).Also draw the trace of computi
laila [671]

Answer:

p(x,n)

1. if(n==0)    [if power is 0]

2.    then result =1.

3.else

4. {    result=1.

5.      for i=1 to n.

6.          {  result = result * x. }  [each time we multiply x once]

7.       return result.

8.  }

Let's count p(3,3)

3\neq0, so come to else part.

i=1: result = result *3 = 3

i=2: result = result *3 = 9

i=2: result = result *3 = 27

Explanation:

here the for loop at step 4 takes O(n) time and other steps take constant time. So overall time complexity = O(n)

6 0
3 years ago
Un usuario desea conocer de manera descriptiva ,como se lleva a cabo el proceso de solicitud de transferencia monetaria en una p
Rus_ich [418]

Answer:

Research My Friend Use a Translator Promise!!

6 0
3 years ago
Read 2 more answers
An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul
WINSTONCH [101]

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

8 0
3 years ago
The part of the web page a user can view in a browser is located within the tag.
IceJOKER [234]

<body>

A website is structured with 3 main tags <html>, <head>, and <body>. The <html> tag contains the whole site the <head> tag holds metadata, and the <body> tag holds what you can view.

<html>

<head>

will include things such as language title or links to a stylesheet.

</head>

<body>

what a user will see

</body>

</html>

5 0
2 years ago
How to do a row of circles on python , with the commands , picture is with it .
kotykmax [81]

Answer:

o.o

Explanation:

5 0
2 years ago
Other questions:
  • Which best describes inserting a table using the Table Gallery
    10·2 answers
  • _________ is a protocol used by e-mail clients to download e-mails to your computer. (
    6·1 answer
  • A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and stor
    9·1 answer
  • java Write a program that reads a list of words. Then, the program outputs those words and their frequencies. The input begins w
    11·1 answer
  • ___________ is related to mass, but also includes the gravitational pull of the Earth.
    14·1 answer
  • When you press the ____ key without entering any text after the automatic bullet character, Word turns off the automatic bullets
    11·1 answer
  • HI How are you anyways are any of you intreseted in my giveaway
    7·2 answers
  • An alternative to configuring individual workstations is to establish configurations dynamically when the computers connect to t
    7·1 answer
  • Intelligent transportation systems use GPS to<br> Select all that apply.
    5·1 answer
  • FILL IN THE BLANK.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!