answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jasenka [17]
2 years ago
11

Computers, lights, appliances, and motors are examples of

Computers and Technology
1 answer:
nirvana33 [79]2 years ago
3 0
<span>Computers, lights, appliances, and motors are examples of  resistors.
</span>Resistor is a <span>passive electrical component which main characteristic and purpose is to create resistance in the flow of electric current.
The resistance is measured in Ohms.</span>
<span>An ohm is the resistance that occurs when a current of one ampere passes through a resistor with a one volt drop .</span>
You might be interested in
When a button is selected, the computer processes the code contained in the buttons ____ event procedure?
My name is Ann [436]
The event is called keypress, usually the code is referred to as callback.
6 0
2 years ago
What does the binary odometer show about representing large numbers​
Gelneren [198K]

Answer and Explanation:

The binary odometer represents the large number to judge that what happened when there is a large number that gets too large

Here we visit the level 2 of the binary odometer widget in the chapter of Code studio

This represents a widget that reproduced an odometer of a car in which the tracking of a device could be known that how much far the car is driven with respect to the miles or kilometers

7 0
2 years ago
Consider a short, 10-meter link, over which a sender can transmit at a rate of 150 bits/sec in both directions. Suppose that pac
Katarina [22]

Answer:

The Tp value 0.03 micro seconds as calculated in the explanation below is negligible. This would lead to a similar value of time delay for both persistent HTTP and non-persistent HTTP.

Thus, persistent HTTP is not faster than non-persistent HTTP with parallel downloads.

Explanation:

Given details are below:

Length of the link = 10 meters

Bandwidth = 150 bits/sec

Size of a data packet = 100,000 bits

Size of a control packet = 200 bits

Size of the downloaded object = 100Kbits

No. of referenced objects = 10

Ler Tp to be the propagation delay between the client and the server, dp be the propagation delay and dt be the transmission delay.

The formula below is used to calculate the total time delay for sending and receiving packets :

d = dp (propagation delay) + dt (transmission delay)

For Parallel downloads through parallel instances of non-persistent HTTP :

Bandwidth = 150 bits/sec

No. of referenced objects = 10

For each parallel download, the bandwith = 150/10

  = 15 bits/sec

10 independent connections are established, during parallel downloads,  and the objects are downloaded simultaneously on these networks. First, a request for the object was sent by a client . Then, the request was processed by the server and once the connection is set, the server sends the object in response.

Therefore, for parallel downloads, the total time required  is calculated as:

(200/150 + Tp + 200/150 + Tp + 200/150 + Tp + 100,000/150 + Tp) + (200/15 + Tp + 200/15 + Tp + 200/150 + Tp + 100,000/15 + Tp)

= ((200+200+200+100,00)/150 + 4Tp) + ((200+200+200+100,00)/15 + 4Tp)

= ((100,600)/150 + 4Tp) + ((100,600)/15 + 4Tp)

= (670 + 4Tp) + (6706 + 4Tp)

= 7377 + 8 Tp seconds

Thus, parallel instances of non-persistent HTTP makes sense in this case.

Let the speed of propogation  of the medium be 300*106 m/sec.

Then, Tp = 10/(300*106)

               = 0.03 micro seconds

The Tp value 0.03 micro seconds as calculated above is negligible. This would lead to a similar value of time delay for both persistent HTTP and non-persistent HTTP. Thus, persistent HTTP is not faster than non-persistent HTTP with parallel downloads.

4 0
2 years ago
What are threats to computer system
Readme [11.4K]
Theft or vandalism through to natural disasters are physical threats. Non-physical threats target the software and data on the computer systems, Like hackers or just straight up viruses. Also, untrustworthy apps or games can give your computer viruses as well.
3 0
2 years ago
A government agency is getting rid of older workstations. The agency will donate these workstations, along with other excess com
Basile [38]

Answer:

The answer is "Using the DoD 5220.22-M method and  Degauss media with a magnet".

Explanation:

The "DoD Standard" is a term used during the data sanitizing industry and refers to DoD 5220.22-M. The simplest ways are being used to help eliminate the previously stored data, by deleting hard disc storage facilities with the same data wherever that used a sequence of all zeros.

The sparging eliminates statistics to entirely delete the gravitational flux from electronic media. Hard drives as well as other data storage devices, for example, computer tapes, retain magnetic data. It could no longer be seen as storage after a disk is degaussed.

6 0
2 years ago
Other questions:
  • The OSHA Workplace Poster 3165 is optional for workplaces.<br> A) True<br> B) False
    13·2 answers
  • Distinguish multiple inheritance and selective inheritance in oo concepts.
    14·1 answer
  • Why would someone need to use tools like IECacheView or MyLastSearch on a system? Do companies have the right to search a workst
    11·1 answer
  • Templates contain common layout and formatting that can save you time by not having to recreate documents from scratch. True or
    10·1 answer
  • A website updated daily could be considered _____. a. authoritative b. objective c. accurate d. timely
    8·1 answer
  • Write a function that computes the average and standard deviation of four scores. The standard deviation is defined to be the sq
    15·1 answer
  • When using the following symbol, there are two arrows coming out of it. One arrow corresponds to what happens in the program if
    7·1 answer
  • Use Excel to develop a regression model for the Consumer Food Database (using the "Excel Databases.xls" file on Blackboard) to p
    13·1 answer
  • The Online Shopping system facilitates the customer to view the products, inquire about the product details, and product availab
    8·1 answer
  • 1. (1 point) Which flag is set when the result of an unsigned arithmetic operation is too large to fit into the destination? 2.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!