The numbers of bit that's can be transferred per second over a given transmission medium . Finding single technical term

Answers

Answer 1
As we all know that 1024 are the mega bite in computer

Related Questions

What is this on googel documents and how do I fix it

Answers

Answer:

if you're trying to take off the words on the side, when you hover over it, an "X" will appear and you can delete it

Explanation:

I have a problem. I can't cycle between game packs on my strike pack, I've watched so many vids I'm on Xböx and I'm holding the left button and clicking right paddle and it does nothing! If you could help it would be appreciated

if anyone knows how to help please do some people might not even know what a strike pack is only respond if you do please ​

Answers

Answer:

Maybe if u put the disk back in, or restart it if it doesn't do anything hope this helped.

Explanation:

Maybe if u put the disk back in, or restart it if it doesn't do anything hope this helped.

Which string method returns true if the character is a numeric character?
letter = input("Enter a letter: ")

A. isDigit(letter)
B. isdigit(letter)
C. letter.isDigit()
D. letter.isdigit()

Answers

Answer:

It is D. letter.isdigit()

Explanation:

reason being is that there is only very few scenarions that require a capital letter in them and most of those that have scenarions are to input a operation into the program.

In the given options, the method that will return true when an input charater is a numeric is optionC. letter.isDigit()

Methods In Programming

Basically what this function does it to check whether the input variable letter is a numeric character, if true then the function returns true.

Hence, the functions input parameter is a string and it returns and boolean

it should be noted that there is a sligth difference between and method and a function in programming.

Learn more about programming here:

https://brainly.com/question/1538272

Match each type of option on the left with a corresponding function on the right.

Answers

Answer:

yes. the above is correct

Explanation: q posted

Answer: Anwer is correctly shown!!!!!!!!

Explanation:

HOPE IT HELPS Y'ALL!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

how does microsoft label mac addresses in the windows utilities that show you the mac address?

Answers

Based on computer analysis, Microsoft labels mac addresses in the windows utilities "by showing the MAC address in the 'Physical Address' field."

What is MAC Address?

MAC Address is the acronym for media access control address. A distinct identifier is allocated to a network interface controller (NIC).

MAC address is used as a network address in communications within a network component.

There are two ways to check for a MAC address in the Windows Utilities which is either through Command Prompt or Network Setting.

Hence, in this case, it is concluded that the correct answer is "by showing the MAC address in the 'Physical Address' field."

Learn more about MAC Address here: https://brainly.com/question/24812654

Open-ended games give players the most freedom to explore other worlds.

A.
True
B.
False

Answers

A - trueeeeeeeeeeeeee

what is the full form of BASIC​

Answers

Answer:

BASIC, in fullBeginner's All-purpose Symbolic Instruction Code, computer programming language developed by John G.

Can someone plss help me!!

Answers

Answer:

HTML elements are delineated by tags, written using angle brackets.

Explanation:

Tags such as <img /> and <input /> directly introduce content into the page.

is a virtue by which you need to secure information by limiting computer access to authorized personnel only.

Answers

Answer:

ummmmmmmmm

Explanation:

Confidentiality is a virtue which states that you need to secure information by limiting computer access to authorized personnel only.

Keeping confidential data is crucial especially if your business deals with very important information about a person and his security.

Trust is built between a company and a client. The client trusts the company to keep his information secure and confidential from outside parties. Once the confidentiality of the company is compromised, the business will suffer because clients will no longer trust the company to keep their data secure.

! (( i > ( f + 1)) es verdadero o falso segun la logica de programación.

Answers

Answer:

yeajadaj

Explanation:

Jacob is preparing a presentation on the health and social advantages of taking up a sport at an early age. Most of the slides in his PowerPoint presentation provide information using colorful graphics and charts. He plans to give notes to his audience to help them follow along.

Jacob is preparing a presentation on the health and social advantages of taking up a sport at an early age. Most of the slides in his PowerPoint presentation provide information using colorful graphics and charts. He plans to give notes to his audience to help them follow along.

How should Jacob format the Notes Master so it will be most helpful to his audience?

Do not include a slide image, leaving the maximum room to take notes.
Do not include a notes pane because graphics do not need to be annotated.
*Make the slide image large so the charts can be seen clearly.
Make the text pane large so the audience can draw their own charts.

Answers

Answer:

C. Make the slide image large so the charts can be seen clearly.

Explanation: Edg

The WordPress Widgets submenu is located where on the WordPress site?


Themes

Appearances

Background

Customize

Answers

Answer:

Appearances

Explanation:

In your dashboard, click on Appearance → Customize → Widgets. Choose the location where you'd like to place the widget on your site. Common options here include the Footer and Sidebar, but this may be different depending on your theme..

Go to Appearance > Widgets in the WordPress Administration Screens. Choose a Widget and either drag it to the sidebar where you wish it to appear, or click the widget, (select a destination sidebar if your theme has more than one) and click the Add Widget button.

[ RevyBreeze ]


[tex]{\huge{\underline{\bf{\pink{Question}}}}}[/tex]

: Given a matrix, we need to count all paths from top left to bottom right of MxN matrix. You can either move down or right.​

Answers

Answer:

[1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.

Based on the information given, the correct option will be [1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.

A matrix simply means a set of numbers that are laid out on rows and columns. The numbers in matrix can represent either data or mathematical equations

It should also be noted that matrix can be used as way of providing quick approximation of calculations.

In conclusion, the correct option is [1,2 ] is the matrix to count all paths from top left to bottom right of M×N matrix.

Learn more about matrix on:

https://brainly.com/question/1821869

Can someone help me with this please

Answers

Answer:

D

Explanation:

Filters and the Sort feature can be applied in any order. 

Y’all got your tickets for Spider-Man No Way Home? I do

Answers

Answer:

IS IT THE NEW MARVEL MVOIE

Explanation:

when a driver receives a text while driving, what can 2022 versa’s hands-free text messaging assistant do?

Answers

Answer:

It can translate text to voice

Explanation:

Type the correct answer in the box. Spell all words correctly.
Which method of cooking does the following passage describe?
makes use of a flat-topped plece of equipment to quickly cook food products.

Answers

Answer:

I believe that this is frying. When you cook food on a flat-topped piece of equipment you are usually using a frying pan.

Explanation:

What is the maximum possible value of num after the code has been run?

Answers

Answer:

the maximum value from the first line is 20 - 0 = 20

and from the second 20-5 and 20+5 so the maximum is 25

PLEASE ANSWER (CODING IN PYTHON)


Ask what kind of pet the user has. If they enter cat, print “Too bad...”, if they enter

dog, print “Lucky you!" (You can change the messages if you like). Once this works,

add other pets. (Iguana, Pig, Rabbit...)

Answers

Answer:

Explanation:

a = input("what kind of pet the user has")

if a == 'cat':

  print("Too bad")

elif a == 'dog':

   print("Lucky you!")

The program based on the information is given below.

What's the program about?

def main():

   pet = input("What kind of pet do you have? ").lower()

   if pet == "cat":

       print("Too bad...")

   elif pet == "dog":

       print("Lucky you!")

   elif pet == "iguana":

       print("That's interesting!")

   elif pet == "pig":

       print("Oink oink!")

   elif pet == "rabbit":

       print("Hop hop!")

   else:

       print("I'm not familiar with that pet.")

if __name__ == "__main__":

   main()

Learn more about program

https://brainly.com/question/26642771

#SPJ2

what types of activities are ideal for a robot to perform?

Answers

The type of activities that are ideal for a robot to perform are; Repetitive tasks

Robots are machines that are programmable by a computer which have the capacity of automatically carrying out a complex series of actions.

Now, robots are used in a wide array of industries which include manufacturing, assembly and packaging, transport, earth and space exploration, e.t.c.

The most common use are found primarily in the automobile industry where they are used to carry out repetitive tasks and those that are difficult or hazardous for humans.

Read more about robots at; https://brainly.com/question/9145476

Can someone help me please and please answer all the questions and explain :D

Answers

Answer:

1. is A. 2. is C.  3. is A.

Explanation:

Filters remove all data that does not match the requirements.

algorithm to find the difference between two numbers second number is greater than first
Plzzz solve this problem ​

Answers

Answer:

You should concentrate yourself

Explanation:

1=x

2=y

x<y

hence proved solved thank me later

what is Q-Basic statement​

Answers

A statement (for the QBASIC) is a set of instructions written by using keywords or commands of QBASIC. Every programming language uses keywords as a statement with certain syntax. The statements are the first stored in the memory and executed only when the RUN command is given

This is an Image of the ......... Topology.


The person who got it right ,i will mark hem or her as brainly.​

Answers

Answer:

Bus Topology

Explanation:

[tex]{}[/tex]

Helena set the price of her scarves at $20. How is she using money?

Answers

Helena is using money as a unit of account.

Money is anything that is accepted and used as a means of payment for products and it used to repay debts.

Functions of money

Unit of account : it is used to value goods and services. Helena values her scarves as $20. Medium of exchange : money can be used to exchange for goods and services. For example, the person who buys the scarves for $20 uses money as a medium of exchange.  Store of value : money can be kept for extended periods and it would not lose its value.

To learn more about store of value, please check: https://brainly.com/question/25965295

In the program to evaluate passwords, you gradually built a message to display to the user. What did you add to the end of each message string to start each message on a new line?

message = message + "Your password needs an uppercase letter. _____ "

\endline

\e

\n

\newline

Answers

You need to add \n to start a new line

The option that one need to add to the end of each message string to start each message on a new line is \n.

What is a message string?

This is known to be a kind of running aspect of text messages that relates to one topic or any question.

Based on the program written above, the option that one need to add to the end of each message string to start each message on a new line is \n as it is the one that will give the best result.

Learn more about program  from

https://brainly.com/question/1538272

#SPJ2

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

Answers

Scroll Down to See Answer ↓

∧-∧ But Read the Explanation to Make Sure ∧-∧

Answer/Explanation:

These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.

Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.

The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.

There seems to be an emerging requirement to specify cryptographic strength objectively  rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected  that U.S. Government (USG) and industry will soon require specific quantitative data to define the  point at which a cryptographic technology or product will satisfy user requirements.

Knowing that these 2 Choices Don't really look Right...

Because it our job = Wrong

Because encryption algorithm are always weak = Wrong

So It leads us to these...

To Prevent all Decryption = ?

To protect online Information = ?

But Base on the Information below:

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

I would say the Answer is To Protect Online Information.

You could Read the Explanation Above If you want to Check.

[RevyBreeze]

What does

mean in computer science

Answers

Answer:

i think the answer is a character or characters that determine the action that is to be performed or considered.

Explanation:

hope this helps

Where are 'if' and 'else' statements shown when printing a document in a word processor?

Answer the question and then your task is to:

Write an algorithm or sequence of instructions that include the IF statement for the document being printed.

Answers

Explanation:

cpt price

given that play_list has been defined to be a list, write an expression that evaluates to a new list containing the elements at index 0 through index 4 in play_list. do not modify play_list.

Answers

Answer:

new_list = play_list[0:4]

Explanation:

new_list = play_list[0:4] is an expression that evaluates to a new list containing the elements at index 0 through index 4 in play_list.

What do you mean by an expression?

A syntactic item in a programming language that may be evaluated to discover its value is known as an expression in computer science. Statement, a grammatical construct that has no meaning, is frequently contrasted with expression.

It is a grouping of one or more constants, variables, functions, and operators that the programming language interprets and calculates (in accordance with its own principles of precedence and association). For mathematical expressions, this procedure is known as evaluation.

In straightforward contexts, the outcome is typically one of several primitive kinds, such as a complex data type, a complex data string, a complex data Boolean type, or another type.

A function, and hence an expression that contains a function, may have side effects in many programming languages. Normally, a side effect-containing phrase lacks referential transparency. Expressions can be converted into expression statements in various languages by adding a semicolon (;) at the end.

Learn more about expression, here

https://brainly.com/question/16804733

#SPJ5

Other Questions
Find a degree 3 polynomial with real coefficients having zeros 4 and 4i and a lead coefficient of 1. Write Pin expanded form. Be sure to write the full equation, including P(x) = . 1. An 80 kg skydiver uses a parachute to produce an applied force of 700 N while falling with an initialvelocity of 40 m/s Over six months, a family's electric bills averaged $55 per month. The bills forthe first five months were $57.60, $60, $53.25, $50.75, and $54.05. What wasthe electric bill in the sixth month? Find the median, mode, and range of thesix electric bills. A restaurant chain would like to measure the proportion of customers who are generally satisfied with the service provided by its staff. At the end of the meal, as the check is delivered to the table, the server asks those at the table to rate their satisfaction with the service provided as "Very Satisfied, "Satisfied, or "Not Satisfied. During a one-week period, 147 customers were surveyed and 135 (93%) reported they were either Satisfied or Very Satisfied. How might the results be biased in obtaining an estimate of all customers who are satisfied with service?Because of response bias, the survey results may overestimate the true proportion of satisfied customers.Because of response bias, the survey results may underestimate the true proportion of satisfied customers.Because of voluntary response bias, the survey results may overestimate the true proportion of satisfied customers.Because customers were surveyed over a one-week period, the results should provide an accurate estimate of satisfied customers.PLEASE HELP How does the poster most likely demonstrate the use of the testimonial technique? the photograph shows fictional film characters, used to "sell" immunization. The text references the health department, a revered government institution. The phrase "call your doctor" adds a reference to an esteemed authority. The phrase "parents of earth" reminds the audience of the importance of parenting. Moral lesson of the poem the leader and the led Help...(MATH)....... PLEASE HELP IN MAJOR NEED OF HELP Make a small sketch of the opening of the mouth ceremony from the book of the Dead of Hunefer and list the 8 canons of Egyptian painting. PLSSSSSSSSSSSSSSSSSSSSSSSSSS HELP Factorise the expression:21x+3xy+6x A square with side length s has perimeter 4s. Nellie painted on a square canvas that is 10.5inches on each side.What is the perimeter of the picture?Write your answer as a whole number or decimal. Each JavaScript command line ends with a(n) ____ to separate it from the next command line in the program. about what percentage of the worlds known oil reserves are located in the middle east and north africa? The era of Congressional ("Radical") Reconstruction can be seen as a failure because*20 pointsA) it prevented Southern states from holding elections.B) it punished all people in the Southern states equally.C) it resulted in the severing of ties with former European allies.D) it did not adequately protect former slaves from having their rights violated Help pleaseSimplify the difference quotient (f(x + h) f(x) )/h if h 0. f(x) = x2 + 38 Which statement best summarizes the authors ideas?The differences between men and women allow them to balance one another, and they should be considered as equal as they are in nature.There are differences between men and women that should be more considered when determining what boys and girls learn in school.Men and women are different, and they perform different duties throughout history, school, and nature.Men and women have served different roles in government and society, but women will soon prove their superiority when they have rights. What is the answer to this question? what would do the most to reduce indoor air pollution in the developing world? 1) 0.52 + 1.6 + 8.26 =2) 1.4 + 5.98 + 9 + 0.39 =3) 4.45 + 7 + 0.049 =4) 12.54 1. 054 =5) 0. 685 0. 5903 =6) (34. 89) (0.875) =7) (840) (0.625) =8) 28.5 0.87 =9) 104 6.4 = 1. An expressions equated to another expression is called _______.2. If a = 5, the value of 2a + 5 is _______.3. The sum of twice and four times of the variable x is ______.need help ~ thx for answering~ Helpppppppppppppp meeeeeeeee