answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juliette [100K]
2 years ago
15

Which data type stores images and audio visual clips?

Computers and Technology
1 answer:
Xelga [282]2 years ago
4 0
It could be a 
<span> common settings</span>







You might be interested in
Suppose a computer has 16-bit instructions. The instruction set consists of 32 different operations. All instructions have an op
Kazeer [188]

Answer:

2^7= 128

Explanation:

An instruction format characterizes the diverse part of a guidance. The fundamental segments of an instruction are opcode and operands. Here are the various terms identified with guidance design:  Instruction set size tells the absolute number of guidelines characterized in the processor.  Opcode size is the quantity of bits involved by the opcode which is determined by taking log of guidance set size.  Operand size is the quantity of bits involved by the operand.  Guidance size is determined as total of bits involved by opcode and operands.

6 0
2 years ago
PLEASE HELP!!!
koban [17]

Answer:

Umm what I would do is look at the wires and put them in their color

Explanation:

8 0
2 years ago
Two career fields that lack minority professionals and thus offer many grant opportunities to students are education and _____.
Ainat [17]
My answer is nursing hopes this helps

0 0
2 years ago
Read 2 more answers
A network has N subscribers. Each subscriber is connected directly to all other subscribers.
enyata [817]
Ns me plz/..................

6 0
2 years ago
Consider a DHT with a mesh overlay topology (that is, every peer tracks all peers in the system). What are the advantages and di
Vladimir79 [104]

Answer:

Advantages of DHT with mesh overlay topology

  • A single hop is used to route a message to the peer, the nearest key is used route message between points
  • There are  bi-directional links between each pair of peers other than the broadcasting peer therefore creating a multiple delivery paths from source to other peers

Disadvantages of DHT with mesh overlay topology

  • complexity of the design of a Mesh overlay Topology
  • Consuming process ( tracking of all peers by each peer )

Advantages of circular DHT ( with no shortcuts )

  • less consuming process ( each peer tracks only two peers )

Disadvantages of Circular DHT ( with no short cuts )

  • The number of messages sent per query is minimized
  • 0(N) hopes are required to route message to a peer responsible for the key  

Explanation:

Advantages of DHT with mesh overlay topology

  • A single hop is used to route a message to the peer, the nearest key is used route message between points
  • There are  bi-directional links between each pair of peers other than the broadcasting peer therefore creating a multiple delivery paths from source to other peers

Disadvantages of DHT with mesh overlay topology

  • complexity of the design of a Mesh overlay Topology
  • Consuming process ( tracking of all peers by each peer )

Advantages of circular DHT ( with no shortcuts )

  • less consuming process ( each peer tracks only two peers )

Disadvantages of Circular DHT ( with no short cuts )

  • The number of messages sent per query is minimized
  • 0(N) hopes are required to route message to a peer responsible for the key  

Distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. in the DHT key-value are stored in it

6 0
2 years ago
Other questions:
  • Write a method named quarterstodollars. the method should accept an int argument that is a number of quarters, and return the eq
    13·2 answers
  • Splunk uses ________ to categorize the type of data being indexed..
    11·2 answers
  • If you were teaching a fellow student to use software for the first time and the software had many built-in hotkeys, would you f
    11·1 answer
  • The problem solving process begins by first ______ the problem.
    11·1 answer
  • The Windows ________ is a hierarchical database that stores system configuration information. It maintains files used to control
    15·1 answer
  • Discuss the importance of following a well-integrated change control process on IT projects. What consequences can result from n
    14·1 answer
  • The groups_per_user function receives a dictionary, which contains group names with the list of users. Users can belong to multi
    11·1 answer
  • +10 POINTS AND BRAINLIEST!! HELP ME PLEASE!!~~~
    13·1 answer
  • A reputable, world-renowned auction house uses blockchain to verify the authenticity of paintings prior to placing them up for s
    7·1 answer
  • Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!