1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pachacha [2.7K]
3 years ago
8

Add comma(s) where needed, if needed.

Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
4 0

Answer:

My birthday, October 31, 2005, is on Halloween.

Explanation:

You might be interested in
Please complete the spelling please tell fast.​
LenaWriter [7]

Answer:

spacebar and number i think

Explanation:

5 0
3 years ago
Read 2 more answers
ANSWER QUICKLY!
patriot [66]

Answer:

It is bit { measurement used to quantify computer data. }

7 0
3 years ago
Why should computers have a file structure? For organization For storing code To prevent viruses To keep back-ups of files
AURORKA [14]

Answer: I believe the answer to your question is  For organization I hope this helps!  

8 0
3 years ago
There are generally two ways of implementing dynamic programming solutions to problems, which have equal asymptotic time complex
san4es73 [151]

Answer:

1) Bottom-up

2) Top-down

Explanation:

In general dynamic programming is a divide and conquer strategy which can be implemented using bottom up approach or top down approach.

Bottom-up approach in dynamic programming will solve a relatively simple sub-problem first and then use the solution to build and arrive at solutions to a bigger sub-problem.

Top down approach is reversed to bottom-up approach and is also known as Memoization Method. Instead of solving a problem started from the base state sub-problem, the top down approach break a problem into a smaller problems from the top most destination state until it reaches the bottom most base state.

8 0
4 years ago
Three PCs are on an Ethernet LAN, connected by a hub. Describe how the Ethernet protocol deals with collisions in this situation
sdas [7]

Answer:

All the ports in a hub are in the same collision domain and a hub sends frames from one host to all other hosts in the network. This makes it prone to collision and poor network throughput. Just like a network switch, it uses the CSMA/CD protocol to detect collision in its network.

A network switch reduces its collision domain to just a port and sends frames from one host to another using its mac table as a route. This makes the network very efficient with high throughput. It also uses the CSMA/CD protocol to detect collision

Explanation:

Switches and hubs are used in networking to connect computer devices in a network. A hub is an obsolete device networking that broadcast a frame to all other ports or host in the network except for the send host port. This increases the rate of collision as all the ports in a hub share the same collision domain. A switch is an efficient frame switching device in a network, which uses its MAC table to decide and find a destination host.

CSMA/CD is a collision detection protocol used in a network to detect and prevent a collision. With this protocol, a host is able to listen, wait, send and resend frames to prevent a collision.

3 0
3 years ago
Other questions:
  • Which of the following scenarios demonstrates leadership?
    11·2 answers
  • A software program that enables users to find and display information stored as html pages on the internet is a(n) ____.
    5·1 answer
  • The more resources you have to choose from during an open book test, the better you will do on the test because more
    13·1 answer
  • In which format is information stored on a hard drive?
    5·1 answer
  • Differentiate among a color display, gray scale display, and a black-and-white display​
    7·1 answer
  • About how many jobs in the United States require Microsoft expertise?
    15·1 answer
  • In Google search results, how are organic links different from sponsored links?
    5·2 answers
  • Explain the look of a document which contains several different font sizes and font colors​
    13·1 answer
  • Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
    10·1 answer
  • Your friend says, “I can’t ever watch a streaming movie without it pausing for long moments. It makes me crazy!” What might you
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!