What is the correct order for writing the 3 dimensions for a 3D object? Here are the 3 dimensions:


Width


Height


Length


They need to be written in this format: ___________X___________X___________


Fill in the blanks.
for my sibling.

Answers

Answer 1

Answer:

Length x Width x Hight

Explanation:


Related Questions

When a program is adapted to run on multiple processors in a multiprocessor system, the execution time on each processor is comprised of computing time and the overhead time required for locked critical sections and/or to send data from one processor to another. Assume a program requires t = 100 s of execution time on one processor. When run p processors, each processor requires t/p s, as well as an additional 4 s of overhead, irrespective of the number of processors. Compute the per-processor execution time for 2, 4, 8, 16, 32, 64, and 128 processors. For each case, list the corresponding speedup relative to a single processor and the ratio between actual speedup versus ideal speedup (speedup if there was no overhead).

Answers

I only need points for my questions

determine the factors using computer failures and defects​

Answers

Answer:

Voltage spike – This is a momentary change in the supply of electric power. It’s important to remember that the size of the transient can range from just milliseconds to longer periods of time. Even a small power glitch can damage a computer and corrupt data. If the screen goes blank during a thunderstorm, it’s likely that a voltage spike is responsible.

Circuit board fails with no visible indication of damage – This is the typical scenario: A computer goes down. A defective circuit board is suspected of the fault, but an inspection reveals no signs of physical damage. A replacement board is installed and operation resumes.

Failure to load software upgrades – Computer software often comes with various bugs, or vulnerabilities. These are simply programming mistakes, but they can make the software susceptible to viruses and glitches. When an error is discovered, the software designer sends out a “patch” that requires downloading and rebooting. Failing to upgrade the software by running the patch can lead to corruption of data.

Failure to keep virus protection up to date – There are several malware protection packages available for computer rooms or data centers. Once installed, the subscription must be maintained. One telltale sign of a malware infected computer is slow data processing.

Inadequate cooling – Computers produce heat, and the more data they process, the more heat must be eliminated. Servers, the “brains” of computers, fail under excess heat, so adequate cooling is essential.

Environment – If a computer room has a dedicated cooling system, there may be an opportunity to closely control the heat. If the cooling is shared with other equipment or the space contains offices, we often face a more challenging task. People have comfort needs different to those of computers.

Loss of Power, PDU fails – Power Distribution Units (PDU’s) are similar to power bars in homes and offices. They distribute power to different components in a computer room, and are usually located next to the server racks. PDU’s suffer a range of problems. Receptacles wear out and can be the sources of bad contacts, and moisture can lead to corrosion.

UPS batteries – Uninterruptible Power Supply (UPS) batteries are found in computer rooms. Most often, they are used to provide continuous power for a limited time, during an outage. Depending on how it’s used and the design of the battery, the life span can be as short as 4-5 years for what is considered a “10 year life” battery. Elevated room temperatures will shorten the life of any battery. Even a small facility such as a dentist office uses UPS batteries.

Transfer switch battery defective – This can be an indication that the site lacks an effective battery maintenance program. It can also be a sign that the transfer switch is “frozen” in position. Preventive maintenance could help avoid a breakdown.

Failure of standby power to synchronize (come on line) – When electric power from the grid disappears, standby power takes over in two different ways. In a small computer room, the focus is on turning computers off in a controlled manner. A fully charged UPS will provide power for 10-15 minutes to allow a computer to save its data and turn off. In a larger facility, it’s the matter of keeping cooling and power going long enough to give the standby generator an opportunity to “synchronize,” to get up to a rate of speed sufficient to power the infrastructure and continue data processing.

Diesel fuel contaminated – Most medium to large facilities have generators powered by diesel fuel, which can become contaminated and useless when a power outage occurs. Water is usually the culprit. Regular fuel testing is necessary to avoid contamination.

Storage defective – Data is stored on magnetic disks or tape. Both can be damaged during normal operation, so it’s a good practice to back up stored data on a regular basis. Backing up means creating a spare data storage. Failure of a tape or disk drive is often, but not always, proceeded by noise. Opening the unit to attempt data restoration is better left to a professional.

Sprinkler system turns on above the servers – Where a data room is protected by a water sprinkler system, a small spill can damage the electronic components. This is particularly true in cases where sprinkler heads are located directly above the servers.

Computers are crucial to business today, but there are so many things that can cause them to fail. By addressing the above common culprits, you could help reduce the overall risk of your computer systems failing.

Explantion: I hope this helps!!!!! :)

In Reinforcement Learning, algorithms that learn from trial and error are called

Answers

Answer:

Explanation:Reinforcement Learning(RL) is a type of machine learning technique that enables an agent to learn in an interactive environment by trial and error using feedback from its own actions and experiences.

In Reinforcement Learning, algorithms that learn from trial and error are called as long term reward.

What are reinforcement learning?

Reinforcement learning are defined as a branch of machine learning that looks at how intelligent agents should behave in a given situation to maximize the idea of cumulative reward. In order to optimize the "reward function" or other user-provided reinforcement signal that builds up from the immediate rewards, the agent uses reinforcement learning to develop an optimal or nearly optimal strategy.

Long term rewards are defined as a corporate policy that pays staff for achieving defined objectives that boost shareholder value. Without using a world model, learn how to plan out scenarios and behaviors to maximize long-term gain.

Thus, in Reinforcement Learning, algorithms that learn from trial and error are called as long term reward.

To learn more about Reinforcement Learning, refer to the link below:

https://brainly.com/question/18881520

#SPJ6

Pls awnser I will mark brainliest math

Answers

It’s 34....!!!! i did this before

Answer:

2788 or 116

Explanation:

The Office Assistant is available in Access just like it is in other Office applications,True
False

Answers

Answer:

True.

Explanation:

Microsoft Access can be defined as a software application or program designed by Microsoft corporation to avail end users the ability to create, manage and control their database.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

An Office assistant refers to an intelligent user interface designed and developed by Microsoft Inc as a user interface for all of the Microsoft Office applications. It is designed to provide assistance or help end users by making the retrieval of information from Office help interactive through the use of animated characters.

Hence, the Office Assistant is available in Access just like it is in other Office applications.

5.16 LAB: Intersection of two lists Programming Objectives With two user input lists, such as the example below: [1,3,6,78,35,55] and [12,24,35,24,88,120,155], write a program to make a list whose elements are intersection (common) of the user input lists. Please note that redundant elements should be counted only once. Technical Descriptions Your program should interact with its user such that two lists of different number of elements can be arbitrarily specified through program input. With the lists above as an example:

Answers

Yeeeeeeeeeeeeeeeeeeeeeee

HELP PLS
Which technologies have made global communication instant and more effective? Choose THREE answers.

social media
wireless devices
smart phones
automobiles
printed newspapers

Answers

Answer:

(1). social media

(2). wireless devices

(3). smart phones

Explanation:

The three technologies that have made global communication instant and more effective are social media, wireless devices, and smart phones.

Here,

Social media platforms have revolutionized the way people communicate globally. They allow individuals to connect, share information, and communicate with others in real-time, regardless of geographical location.

Wireless devices, such as laptops, tablets, and smartwatches, have eliminated the need for physical connections like cables and wires. They allow users to access the internet and communicate with others from virtually anywhere with a wireless signal.

Smartphones combine the features of a mobile phone with advanced computing capabilities. They provide instant communication through voice calls, text messages, emails, and various messaging apps.

Smartphones also allow users to access social media platforms and use wireless internet, making global communication more convenient and efficient.

Know more about communication technologies,

https://brainly.com/question/33037966

#SPJ6

Write a program that reads in ten numbers from the user and displays the distinct numbers. If a number entered by the user appears multiple times, your program needs to filter the repeated numbers and therefore displaying the repeated numbers only once. For example, if the user enters the number 1, 4, 6, 1, 8, 4, 2, 1, 3,9 then the output of your program should be: 1, 4, 6, 8, 2, 3, 9.

Answers

Answer:

Here you go :)

Explanation:

Change this however you'd like:

array = []

for n in range(10):

   x = int(input("Enter integer: "))

   array.append(x)

dup = set(array)

print(", ".join(str(i) for i in dup))

Which of the following are advantages of converting analog audio to digital audio? Choose all that apply

Reduction in editing time

Consistently accurate copies of audio recordings

Preservation

Susceptibility to computer viruses

Answers

Answer:

b and c

Explanation:

sorry if there wrong

Answer: A, B, and C

Explanation:

What are some ways you can work with templates? Check all that apply.
A. creating a new template from scratch
B. scanning a template from a printed page
C. using many different templates in one document
D. using a preexisting template
E. modifying a preexisting template

Answers

What are some ways you can work with templates? Check all that apply.

Answer: (A,D,E) see picture below for help also.

Answer:

Look at the other answer that guy knows what he is talking about

Explanation:

Please answer today 20 pts!!

Type the correct answer in the box. Spell all words correctly.
Joe is a part of a team where the members come from various cultures and have different perspectives and viewpoints. What does Joe need to
improve in order to work successfully in the team?
In order to work successfully in the team, Joe needs to improve his awareness of _______.

Can only be 1 or 2 words.

Answers

Answer:

give each member their own translator and a seprate workspace

sry bout the spelling

Explanation:

The steps.txt file contains the number of steps a person has taken each day for a year. There are 365 lines in the file, and each line contains the number of steps taken during a day. (The first line is the number of steps taken on January 1st, the second line is the number of steps taken on January 2nd, and so forth.) Write a program that reads the file, then displays the average number of steps taken for each month. (The data is from a year that was not a leap year, so February has 28 days.)

Answers

Answer:

In Python:

file = open('steps.txt', 'r')

readLine = file.readlines()

begin = 0

mdays = (31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31)

print("Month"+"\t\t"+"Average Steps")

for m in range(len(mdays)):

end = begin + mdays[m]

steps = readLine[begin:end]

sumsteps = 0

for s in steps:

 sumsteps = sumsteps + int(s)

 

average = round(sumsteps/mdays[m],1)

print(str(m+1)+"\t\t"+str(average))

begin = begin + mdays[m]

Explanation:

This line opens the step.txt file

file = open('steps.txt', 'r')

This reads the content of the file

readLine = file.readlines()

begin = 0

This initializes the months of the days to a tuple

Mmdays = (31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31)

This prints the header

print("Month"+"\t\t"+"Average Steps")

This iterates through the tuple

for m in range(len(Mmdays)):

This calculates the days in each month

end = begin + Mmdays[m]

This gets the number of steps in each month

steps = readLine[begin:end]

This initializes the number of steps to 0

sumsteps = 0

This iteration sums up the number of steps in each month

for s in steps:

 sumsteps = sumsteps + int(s)

This calculates the average of steps rounded to 1 decimal place  

average = round(sumsteps/Mmdays[m],1)

This prints the calculated average

print(str(m+1)+"\t\t"+str(average))

This calculates the beginning of the new month

begin = begin + Mmdays[m]

Why do the optical signals used in optical fibre cables have a
very short wavelength?​

Answers

Answer:

Optical signals have very high frequencies. A high frequency means a short wave length because the wave length is inversely proportional to the frequency (λ = v/f), where v is the propagation speed in the media.

Explanation:

Since optical signals have a greater frequency, measured in nanometers, their wavelengths are shorter (10-9 meter). A billionth of a meter is equal to one nanometer (nm), a unit of length.

What are optical signals?

An electromagnetic signal is an optical signal. It has oppositely polarised magnetic and electric fields.

The frequency of this EM pulse is typically very high (in the order of THz). As a result, measuring it in terms of wavelength is more practical.

The frequency of optical communications are very high. Since the wave length and frequency are inversely related, a high frequency implies a short wavelength.

To a receiving end, where the light signal is processed as data, the fiber transfers "data" by light.

As a result, fiber optics serves as a "pipe" or transmission medium for signals that need to travel vast distances quickly.

Thus, the optical signals used in optical fiber cables have a very short wavelength.

For more details regarding optical signal, visit:

https://brainly.com/question/17646651

#SPJ2

$
Type the correct answer in the box. Spell all words correctly.
What file format was created for video by Microsoft?
_______was created by Microsoft.
ANYONE NOW!!

Answers

Answer:

Windows media video

Explanation:

it is the most recognizable video compression format within the WMV family

Answer:

AVI

Explanation:

AVI is defined by Microsoft. The avi file format is the most common format for audio and video data on a computer.

I got it right on the test!

How do you add a space after a line in my terminal workspace?'

Example: I'd like my program to have a line space after

Line 2: "Computer Programming"
blank
Line 3: Author
blank
Line 4: Due Date

Answers

Press enter hope that helps

Please help ASAP! will mark brianliest! 30 points!
Which popular VPN protocol allows segment access for users?

IPsec
PPTP
L2TP
SSL VPN

Answers

Answer:

SSL VPN

Explanation:

Secure Sockets Layer, or SSL VPN, is the second common VPN protocol.

A big plus for SSL VPNs is that they can allow segmented access for users. For example, users can be limited to checking email and accessing shared drives rather than having access to the entire network.

SSL VPNs come in two types, SSL portal and SSL tunnel.

SSL Portal VPNs

SSL Portal VPNs allow a user to securely access the web from a browser once the user logs into the VPN’s online portal using a specified method of authorization.

This type of SSL VPN gets its name because of how the user accesses it – through a single web page, or portal. The page acts as a single gateway to the other services available on the secured network.

SSL Tunnel VPNs

SSL Tunnel VPNs allow the user to not only access the web securely, but to also use applications and other network services that aren’t based on the web.

Due to their sophisticated segmentation capabilities, SSL VPNs often require more skill to implement.

VPNs are not a cure-all

Of course, what you could do is circumvent the entire debate around VPN SSL vs IPSEC. Our Gatekeeper offering is an enhanced alternative to VPN with no client, that still offers two-factor authentication to secure remote access.

Wherever you land between VPN SSL vs IPSEC, of if you join #TeamGatekeeper, having one of these tools to protect web traffic is a great way to help secure information, but it’s not an end-all be-all security solution.

After all, a VPN won’t protect your employees from social engineering attacks such as email phishing.

(hope this helps can i plz brainlist it will make my day :D hehe)

Name a type of malware designed to provide unauthorized , remote access to a user's computer

Answers

This is called Remote Access Trojan.

Create a website on budget
‐--------
Use maximum features of html in it
Table, form, video, image ,hr ,lists background colour,video with controls,video clip of speech of finance minister, attach email I'd, link colour ,align

Answers

Answer:I bet your attention automatically tuned into the video background, right?  It’s almost impossible to ignore it as it is moving.

There’s nothing wrong with you – it’s just human nature and how we subconsciously decide where to pay our attention to.

We are easily distracted by anything that moves – just like that dog that ignores everything in its world to chase that pesky little squirrel!

“Okay, you got me to look at your silly video, what does this have to do with my website design?”

What a great question and I’m glad you asked.

A video background on your website, if used properly, can help you capture your website visitors’ attention too!

Video background is one of the most popular website design trend that seems to be here to stay.

Marketers love video backgrounds because they make websites look modern and create a sense of artistry that static background images simply can’t match up to.

Many website conversion experts and regular people alike see their visitors stay on their websites longer and more likely to sign up or opt-in to their product / service offers.

I’ll admit – a 138% improvement sounds extraordinary and challenging to achieve every other day.

Keep in mind that such high figure is from tests ran by conversion / business optimization professionals who do this for a living. So it’s fair to say not everybody who runs a DIY website will see similar improvements, just by adding a video background to their website.

However, even a 10% – 20% improvement in engagement and conversion is not unreasonable for even a first-time website owners with no professional help  – if you use video background on your homepage the right way!

Imagine if you collected email newsletter subscribers so you can follow up with special promotions or share interesting discussions to build your brand.

Consider what a 20% increase in subscribers can do to your business? This can mean more sales and/or higher brand awareness!

All this can be done if you can capture your visitors’ attention more effectively – by using a video background.

This is not just a hypothetical idea. A lot of real life case studies have demonstrated how many businesses have succeeded by using video backgrounds to improve sales.

Like all things in life, there is a right way and a wrong way of doing things.

Even with something as groundbreaking as a video background, you can still screw it up and end up hurting your overall website design and experience – if you don’t abide by some basic rules.

So, understanding how to avoid basic mistakes when using a video background on your homepage can give you a much higher chance of succeeding in improving your web design.

In this guide, we will show you all the steps and best practices you should take to use video background effectively:Video background is most effective when you use it to (1) create a vibe, (2) to set a tone or (3) to induce an emotional reaction.

Let’s check out some examples:

Example #1: Businesses, Services, Organizations

Video backgrounds work for most professional websites, whether you are running a clinic, consultancy business, or design agency.

You can use a video background to show clips of the life of your staff or even the process of helping a customer. This gives your potential clients a chance to get to know you before even talking to you. It also paints a very vivid visual representation of what they can expect to experience from your business.Grain & Mortar is a design agency. This example is interesting because it shows you that you don’t always need to have a full page video background to get a similar benefit. They only display a video in the header section of the page that takes no more than half the screen real estate.

The video shows the daily collaboration of the staff (strategy sessions) and how they create design solutions for their clients.

At this moment, video background themes are somewhat limited in Shopify’s Theme Store. You do get more selection if you search for Shopify Video Background Themes in third party providers like Themeforest.

Do keep in mind all themes available in Shopify’s Theme Store are screened, approved and supported by Shopify.

In comparison, Shopify Themes from third party providers do not undergo Shopify’s direct screening process. While I am not saying third party themes are not as good, I just want you to be informed if you are considering whether to purchase from a third party provider.

Explanation:

lol i know this is alot just copy and paste it and can i have a brain list

of what is famous Ted Nelson?​

Answers

Answer:

Nelson proposed a system where copying and linking any text excerpt, image or form was possible.

Explanation:

Ted Nelson is one of the theoretical pioneers of the world wide web who is best known for inventing the concept of hypertext and hypermedia in the 1960s. As one of the early theorists on how a networked world would work.

How I know:

I goggle it.

Write a Java program that asks the user to enter an array of integers in the main method. The program should prompt the user for the number of elements in the array and then the elements of the array. The program should then call a method named minGap that accepts the array entered by the user as a parameter and returns the minimum 'gap' between adjacent values in the array. The main method should then print the value returned by the method. The gap

Answers

Answer:

In Java:

import java.util.*;

class Main {  

public static void minGap(int intArray[], int arrlength) {  

 if(arrlength <2){return;}

 int minm = Math.abs(intArray[1] - intArray[0]);  

 for (int i = 2; i < arrlength; i++)  

  minm = Math.min(minm, Math.abs(intArray[i] - intArray[i - 1]));  

 System.out.print("Minimum Gap = " + minm);  

}  

public static void main(String arg[]) {  

 Scanner input = new Scanner(System.in);

 int arrlength;

 System.out.print("Array Length: ");

 arrlength = input.nextInt();

 int[] intArray = new int[arrlength];

 for(int i = 0;i<arrlength;i++){

     intArray[i] = input.nextInt();

 }

 minGap(intArray, arrlength);  

} }

Explanation:

The minGap method begins here

public static void minGap(int intArray[], int arrlength) {

This checks if array length is 1 or 0. If yes, the program returns nothing

 if(arrlength <2){return;}

If otherwise, this initializes the minimum gap to the difference between the 0 and 1 indexed array elements

 int minm = Math.abs(intArray[1] - intArray[0]);  

This iterates through the array elements

 for (int i = 2; i < arrlength; i++)  

This checks for the minimum gap

  minm = Math.min(minm, Math.abs(intArray[i] - intArray[i - 1]));  

At the end of the iteration, the minimum gap is printed

 System.out.print("Minimum Gap = " + minm);  

}  

The main method begins here

public static void main(String arg[]) {  

 Scanner input = new Scanner(System.in);

This declares the length of the array

 int arrlength;

This prompts the user for array length

 System.out.print("Array Length: ");

This gets the user input

 arrlength = input.nextInt();

This declares the array

 int[] intArray = new int[arrlength];

The following iteration gets input for the array

 for(int i = 0;i<arrlength;i++){

     intArray[i] = input.nextInt();

 }

This calls the minGap method  

minGap(intArray, arrlength);  

}

which of these devices can not only manage traffic between local PCs in a network, but can also access outside networks?
network adapter
switch
router
repeater

Answers

I think it’s router or repeater

Answer:

router

Explanation:

In a block of addresses we know the IP address of one host is Roll no. Roll no. Roll no. Roll no./20.What is the first address and the last address of this block? Find the number of addresses in the block?
Hint: if your roll no is 33 then your ip address will look like this: 33.33.33.33/20

Answers

Answer:

If there’s one topic that trips people up (both new and experienced) in the networking industry, it is that of Subnetting.

One of the reasons this happens is that one has to perform (mental) calculations in decimal and also binary. Another reason is that many people have not had enough practice with subnetting.

In this article, we will discuss what Subnetting is, why it came about, its usefulness, and how to do subnetting the proper way. To make this article as practical as possible, we will go through many examples.

Note: While subnetting applies to both IPv4 and IPv6, this article will only focus on IPv4. The same concepts explained here can be applied to IPv6. Moreover, subnetting in IPv6 is more of a want rather than a necessity because of the large address space.

IP address network

For example, any traffic with a destination IP address of 192.168.1.101 will be delivered to PC1, while traffic addressed to 192.168.1.250 will be delivered to SERVER.

Note: This is an oversimplification of things just for understanding sake and refers to Unicast (one-to-one) IPv4 addresses. Traffic sent to Multicast (one-to-many) and Broadcast (one-to-all) IP addresses can be delivered to multiple devices. Also, features like Network Address Translation (NAT) allow one IP address to be shared by multiple devices.

To help your understanding of IP addresses and subnetting, you need to resolve the following fact in your head: Computers think in binary, that is, 0s and 1s. Therefore, even though we see an IP address represented like 192.168.1.250, it is actually just a string of bits – 32 bits in total for IPv4 addresses.

To make them more readable for humans, IPv4 addresses are represented in dotted decimal notation where the 32 bits are divided into 4 blocks of 8 bits (also known as an octet), and each block is converted to a decimal number.

For example, 01110100 in binary is 116 in decimal:

A unicast IPv4 address such as 192.168.1.250 can be divided into two parts: Network portion and Host ID. So what does this mean? Well, IPv4 addresses were originally designed based on classes: Class A to Class E. Multicast addresses are assigned from the Class D range while Class E is reserved for experimental use, leaving us with Class A to C:

Class A: Uses the first 8 bits for the Network portion leaving 24 bits for host IDs. The leftmost bit is set to “0”.

Class B: Uses the first 16 bits for the Network portion leaving 16 bits for host IDs. The two leftmost bits are set to “10”.

Class C: Uses the first 24 bits for the Network portion leaving 8 bits for host IDs. The three leftmost bits are set to “110”.

Note: The range of Class A is actually 1-126 because 0.x.x.x and 127.x.x.x are reserved.

With these classes, a computer/device can look at the first three bits of any IP address and determine what class it belongs to. For example, the 192.168.1.250 IP address clearly falls into the Class C range.

Looking at the Host ID portion of the classes, we can determine how many hosts (or number of individual IP addresses) a network in each class will support. For example, a Class C network will ideally support up to 256 host IDs i.e. from 00000000 (decimal 0) to 11111111 (decimal 255). However, two of these addresses cannot be assigned to hosts because the first (all 0s) represents the network address while the last (all 1s) represents the broadcast address. This leaves us with 254 host IDs. A simple formula to calculate the number of hosts supported

Explanation: Final answer is Start address: 192.168.58.0 + 1 = 192.168.58.1

End address: 192.168.58.16 – 2 = 192.168.58.14

Broadcast address: 192.168.58.16 – 1 = 192.168.58.15

Help plz brainliest.

Answers

Answer:

Follows are the solution to this question:

Explanation:

In this question, the equation will be written as the coefficients for each of the bases, that is from the above quantum states b is given as follows:

[tex]\to | b \rangle = 0.4 | 00 \rangle + 0.65 | 01 \rangle + 0.2 | 10 \rangle + 0.61 | 11 \rangle[/tex]

Therefore the equation can be written as in the state b:

[tex]\to \mathbf{state_b = [0.4, 0.65, 0.21, 0.61]}[/tex]

2. As a student (now or in college) name a way you can use Excel. How can that help you as a student?
3. What are some of the important rules to remember when using formulas in Excel? (ex. formulas always
begin with an '- sign)
Ahsteh

Answers

Answer:

The more you try some simple Excel tips and tricks, the more comfortable you’ll be using advanced Excel tricks moving forward. In addition to helping you in college, these Excel tips and tricks can help you secure and retain a job after you graduate. In 2013, IDC published a white paper which was originally commissioned by Microsoft Corporation.

Explanation:

few toffees were distributed among oriya , piyush and payal . priya got 3/8 , piyush and payal 1/8 and 1/2 of total toffees respectively. who got the maximum toffees​

Answers

Answer:

it is payal because 1/2 is a half

Explanation:

there you go

What is the final gear reduction of a compound gear reduction of 36 to 12 for the first stage and 60 to 12 for the second stage?
A. 0.067
B. 0.533
C. 8
D. 15

Answers

Answer:

8

Explanation:

Gear reduction = driven gear teeth / driving gear teeth

First stage reduction :

Driven gear teeth = 36

Driving gear teeth = 12

36 /12 = 3

Second stage reduction :

Driven gear teeth = 60

Driving gear teeth = 12

60 /12 = 5

First stage + second stage

3 + 5 = 8

Use three or more sentences to explain to someone why they might need to use a virtual machine.

Answers

Answer:

Benefits of Virtualization

Reduced capital and operating costs.

Minimized or eliminated downtime.

Increased IT productivity, efficiency, agility and responsiveness.

Faster provisioning of applications and resources.

Greater business continuity and disaster recovery.

Simplified data center management.

Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets from the file. When one of these packets arrives to a packet switch, what information in the packet does the switch use to determine the link onto which the packet is forwarded

Answers

Answer:

The answer is below

Explanation:

Suppose end system A wants to send a large file to end system B, the large file is first divided into smaller chunks. Each chunk is then assigned a header forming a packet. Multiple packets are being generated with each of the packet containing a unique destination address in its header.

When a packet arrives at the packet switch, the switch uses the unique destination address that is attached in the header of the packet to determine the link onto which the packet is to be forwarded.

Need help ASAP. Will mark brainliest!
Which of the following is assigned to every network device?

Digital address
Logical address
MAC address
Personal address

Answers

A feature which is assigned to every (all) network device is: C. MAC address.

What is a MAC address?

MAC address is an abbreviation for media access control address and it can be defined as a unique identifier that is generally assigned by manufacturers to a network interface controller (NIC) of every (all) network device, especially for use as a network address when the device is communicating with other network devices within a network segment.

This ultimately implies that, media access control address (MAC address) is a feature which is assigned to every (all) network device by the manufacturers.

Read more on MAC address here: https://brainly.com/question/25246068

Answer: MAC Address

Explanation: Took the test and it was right :)

What is responsible for analyzing the IT needs of an organization and then
recommending systems to support those needs.

Answers

Answer:

System analyts

Explanation:

I just took it

Other Questions
Owls eat voles (a relative of mice); voles eat grass and seeds. Which food chain is correct? How did John Browns execution affect Louisiana and the whole United States?It caused many abolitionists to go into hiding, giving slave owners in Louisiana and the rest of the South a renewed strength to protect their way of life.It made slave owners in Louisiana and the rest of the South even more fearful of slave revolts, increasing the divide between North and South.It convinced Louisiana slave owners that federal troops and the court system would protect them.It caused many abolitionists to reach out to slave owners in Louisiana and the South to seek compromise. (3x+23)+(7x-4)+(9x-6)+95=540 why is prophase the longest phase of mitosis Help me out please ...................... Which of the following is an example of directive or autocratic management style? The music artist known as The Weekend purchased a lot of bandages in January. The city where he purchased the bandages charges 12% sales tax. He paid $28.89 in sales tax. What was the cost of the bandages before sales tax was added on? What was the total amount The Weekend has to pay? What is the greatestsource of light in theocean? A. 45B. 20C. 15D. 80HELP ME PLEASE I NEED IT! 1. VOCABULARY Copy and complete: 'Two polygons are similar ifcorresponding angles are ? and corresponding side lengths are ?. The ratio of men to women working for a company is 5 to 6. If there are 198 employees total, how many women work for the company? I have a history question plz help: Using your inquiry skills, discover the two-word term that is used by historians to indicatethat there are differences in levels of wealth, amounts of resources, rates of income,sizes of wages and availability of jobs between Canada's provinces and their citizens. In5 sentences, briefly elaborate on your understanding of this concept and explain whysome regions and groups in Canada benefited more from the prosperity of the 1920sthan others. (B1.3)I just need to know the two term word. Ive thought of economic inequality but I dont think thats correct :( What is the reduced radical form of 2[3x] +4[48x]-3[50x] Which of the following are the possible allele combinations from the gametes of an organism with the genotype of AaBb?AAB, onlyBAB and ab, onlyAa and Bb, onlyDAB, Ab, aB, and ab This is what I have so far, but Im not sure what I need to fix. please help asap!! Which of the following is used in playing a pedal steel guitar?O A. a metal barO B. knee leversO c. foot pedalsO D. All of the above. she almost never leaves her clothes on the floor prepositions The number of students in a chess club decreased from 27 to 11. What isthe percent decrease? Round your answer to the nearest percent.Your answer i really need help with this question i dont understand it Qu NO debes hacer para mantener la salud? *O levantar pesas cada diaO hacer ejercicios cada diaOjugar videojuegos cada diaO correr y caminar cada dia