answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
2 years ago
12

Amanda a recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter wher

e they are in the house. Which type of network is best for Amanda and her family?nd her family recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter where they are in the house. Which type of network is best for Amanda and her family?
Computers and Technology
1 answer:
vagabundo [1.1K]2 years ago
7 0

Answer:

wifi is the best network for all, As it gets in all corners of the house.

You might be interested in
Will mark brainliest if correct. First come, first serve.
VladimirAG [237]

Answer:

Low sampling rate and low bit depth are the right options.

Explanation:

The low sampling rate and low bit depth can ensure less memory consumption. The musician here wants to record some initial ideas for some new song. And she is not concerned about the quality of the audio file she is going to send. And she wishes to send the size of the file that is as small as possible so that it can be quite easily downloaded by her bandmate. She can thus afford a low sampling rate and low bit depth, as the quality is not that important. And a low sampling rate and low bit depth can ensure less memory. Hence, these are the correct options here.

4 0
2 years ago
c++ You are given an array A representing heights of students. All the students are asked to stand in rows. The students arrive
Lilit [14]

The below code will help you to solve the given problem and you can execute and cross verify with sample input and output.

#include<stdio.h>

#include<string.h>

 int* uniqueValue(int input1,int input2[])

 {

   int left, current;

   static int arr[4] = {0};

   int i      = 0;

     for(i=0;i<input1;i++)

      {

         current = input2[i];

         left    = 0;

         if(current > 0)

         left    = arr[(current-1)];

      if(left == 0 && arr[current] == 0)

       {

       arr[current] = input1-current;

       }

       else

   {

       for(int j=(i+1);j<input1;j++)

       {

           if(arr[j] == 0)

           {

               left = arr[(j-1)];

               arr[j] = left - 1;

           }

       }

   }

}

return arr;

}

4 0
2 years ago
The piston engine uses the ________ to convert the reciprocating motion of the piston into rotary motion.
PSYCHO15rus [73]

The piston engine uses the crankshaft to convert the reciprocating motion of the piston into rotary motion.

<span>The crankshaft is used to convert reciprocating motion of the piston into rotary motion, while the conversion process is called torque, which is a twisting force. Aside from crankshaft, there are a total of four parts of the engine that work together in order to convert the reciprocating motion into rotary motion namely cylinder, or also called the chamber of the piston, the piston itself, and the connecting rod.</span>

5 0
2 years ago
Referential integrity constraints are concerned with checking INSERT and UPDATE operations that affect the parent child relation
Jet001 [13]

Answer:

a) true

Explanation:

In Computer programming, integrity constraints can be defined as a set of standard rules that ensures quality information and database are maintained.

Basically, there are four (4) types of integrity constraints and these are;

1. Key constraints.

2. Domain constraints.

3. Entity integrity constraints.

4. Referential integrity constraints.

Referential integrity is a property of data which states that each foreign key value must match a primary key value in another relation or the foreign key value must be null.

For instance, when a foreign key in Table A points to the primary key of Table B, according to the referential integrity constraints, all the value of the foreign key in Table A must be null or match the primary key in Table B.

Hence, the referential Integrity constraints ensures that the relationship between the data in a table is consistent and valid.

Hence, referential integrity constraints are concerned with checking INSERT and UPDATE operations that affect the parent child relationships.

<em>This ultimately implies that, referential Integrity are rules used in database management systems (DBMS) to ensure relationships between tables when records are changed is VALID (INSERT and UPDATE).</em>

<em>In a nutshell, it always ensures a primary key must have a matching foreign key or it becomes null. </em>

6 0
2 years ago
A developer needs to create a visualforce page that displays case data. The page will be used by both support reps and support m
shutvik [7]

Answer:

B. Use a new support manager permission sets

Explanation:

According to the requirements, field level security is required so, 1st options is not suitable because it may reduce the maintenance cost but increase the risk of security.

By creating a separate page for each of the two, it will leads to increase in the maintenance cost of the system. So <u>Option C</u> is also not suitable.

Option B is more Suitable as compared to others, that <em>Create a new support manager permission set</em>, with the help of this, both of Support rep and Support manager can visualize their required information with the help of support manager permission. This solution will not compromise the security and not increase the maintenance cost.

7 0
2 years ago
Other questions:
  • A two-dimensional array can have elements of ________ data type(s).
    7·1 answer
  • A mouse is known as a _____ device that is able to detect motion in relation to the surface and provides an onscreen pointer rep
    6·1 answer
  • Define a function PyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the vo
    7·2 answers
  • C++ :Write a program that simulates flipping a coin to make decisions. The input is how many decisions are needed, and the outpu
    13·1 answer
  • Which of the registration patterns is best suited for complex architecture? A. Client side discovery pattern B. Third party regi
    13·1 answer
  • Collaboration online increases students' motivation by
    5·2 answers
  • PC’s &amp; More has shifted to sales and service of laptops and PCs, where it has the potential to triple the number of its cust
    14·1 answer
  • For any element in keysList with a value greater than 60, print the corresponding value in itemsList, followed by a semicolon (n
    14·2 answers
  • A network router connects multiple computers together and allows them to send messages to each other. If two or more computers s
    7·1 answer
  • Write a C program that creates two threads to run the Fibonacci and the Runner processes. Threads will indicate the start and th
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!