problemin what situations is the internet protocol (ip) used?

Answers

Answer 1

Every time two computing devices communicate with one another online, it is used. The location and identification of the network interface are the two primary purposes of an IP address.

A computer network that uses the Internet Protocol for communication is identified by its IP address, which is a numeric label. An example of such an IP address is 192.0.2.1. addressing.

It manages to address and routing for all Internet communication. The protocol explains how IP addresses are used to uniquely identify devices connected to the Internet. Internet-connected devices require an IP address in order to receive messages, much like residences require a mailing address to receive mail.

Internet Protocol is the procedure or method used to transport data from one computer to another over the internet (IP). A host, or a computer connected to the internet, is identified by at least one IP address that sets it apart from all other computers there.

To learn more about IP address click here:

brainly.com/question/29345454

#SPJ4


Related Questions

What is automatic variables in makefile?

Answers

The auto keyword is a simple way to declare a variable that has a complicated type. For example, you can use auto to declare a variable where the initialization expression involves templates, pointers to functions, or pointers to members

What does Microsoft call performance metrics from the OS components and application?

Answers

Microsoft Windows systems provide a tool called Task Manager for managing programmes and processes. It gives pertinent data regarding computer performance and enables users to verify status of active .

What role does performance monitoring serve?

Windows NT Performance Monitor counters gather and display data on system performance. The counters are helpful in finding performance issues or bottlenecks that impact the installed apps or the operating system.

Which OS tasks are there?

The interface between computer hardware and users is called an operating system (OS). A computer's operating system is a piece of software that manages all the fundamental functions, including handling input and output, managing memory and processes, and controlling peripherals like disc drives and printers.

To know more about Task Manager visit :-

https://brainly.com/question/17745928

#SPJ4

With these systems, input and output devices are located outside the system unit.

Select one:
a. Desktop systems
b. Personal digital assistants
c. Smartphones
d. Laptop computers

Answers

The system unit, which stores the computer's essential components like the motherboard, is often distinct from input and output devices like the keyboard, mouse, monitor, and speakers in desktop systems.

Which input and output devices for the system are situated outside the system unit?

The mouse, keyboard, and monitor are examples of input and output devices that are outside the system unit.

What does a computer system unit do?

The component of a computer that houses the main devices that carry out operations and generate results for intricate calculations is called the system unit. It consists of the motherboard, CPU, Memory, and other parts, as well as the housing for these gadgets.

To know more about motherboard visit:-

https://brainly.com/question/29834097

#SPJ1

Computer A is sending data securely to Computer B using public key encryption.
In order for Computer A to encrypt the data, they need to use information from Computer B in a mathematical operation.
What information from Computer B is used in that operation?

Answers

The public key of Computer B is used in the mathematical operation to encrypt the data sent by Computer A.

What is the purpose of using public key encryption in computer communication?

The purpose of using public key encryption in computer communication is to provide a secure and confidential method for exchanging information over an unsecured network.

Can the public key of Computer B be used to decrypt the data sent by Computer A?

No, the public key of Computer B cannot be used to decrypt the data sent by Computer A. Only Computer B's private key can be used to decrypt the data.

Learn more about public key here:

brainly.com/question/29999097

#SPJ4

you have a network address of 133.233.11.0 and a subnet mask of 255.255.255.240. how many assignable host addresses are on each subnet?

Answers

Given a subnet mask of 255.255.255.240, this indicates that the first 28 bits of the network address are used for the network portion, and the remaining 4 bits are used for the host portion.

How to calculate the number of assignable host addresses?

To calculate the number of assignable host addresses on each subnet, we need to determine the number of host bits, which is 4 in this case. The number of assignable host addresses is calculated using the formula:

2^(number of host bits) - 2

Substituting the value of 4 for the number of host bits, we get:

2^4 - 2 = 14

Therefore, there are 14 assignable host addresses on each subnet with the given network address of 133.233.11.0 and subnet mask of 255.255.255.240.

To learn more about subnet mask, visit: https://brainly.com/question/28256854

#SPJ1

what is the name of microsoft's search engine integrated with artificial intelligence from openai?

Answers

The name of Microsoft's search engine integrated with artificial intelligence from OpenAI is "Bing AI".

There is no specific search engine named "Bing AI" from Microsoft. However, Microsoft has been using artificial intelligence and machine learning technologies to enhance its search engine "Bing". Microsoft has partnered with OpenAI to use its advanced language model "GPT-3" to improve the relevance and accuracy of search results on Bing. This collaboration has resulted in the development of AI-powered features such as "Intelligent Answers" and "Deep Search". These features allow Bing to provide more insightful and comprehensive answers to users' queries by analyzing the context and intent of the query.

To provide more accurate search results and improve user experience, Microsoft has been using artificial intelligence and machine learning technologies to enhance its search engine "Bing". The partnership with OpenAI has resulted in the development of AI-powered features such as "Intelligent Answers" and "Deep Search", which enable Bing to provide more insightful and comprehensive answers to user queries. With the help of OpenAI's advanced language model "GPT-3", Bing can analyze the context and intent of a query and provide more relevant search results.

Learn more about OpenAI here:

https://brainly.com/question/30758564

#SPJ4

How to cite a block quote?

Answers

To cite a textual quotation, you must follow the following steps::

First introduce the quote with a signal phrase, followed by a colon.Then, you should indent the entire quote one inch from the left margin and double-space it.After the quote, you should include a parenthetical citation with the author's last name and the page number(s) where the quote can be found.

Here is an example:
According to Smith (2010):

(Smith, 2010, p. 45)

Remember to always be accurate and professional when citing a block quote.

¿Who is block quote?

A block quote is one that starts with a specific income. This income can be divided according to general categories, such as:

Personnel costs.Administration.Publications.Electoral education events.

For more information about block quote, visit:

https://brainly.com/question/30396753

#SPJ11

how does software-defined networking reduce both the risk of human error and overall network support and operations costs?A. It ensures network resources such as printers are used correctlyB. It allows individualized configuration through manual inputC. It increases physical access to all network devicesD. It automates configuration, policy management and other tasks

Answers

Software-defined networking (SDN) reduces both the risk of human error and overall network support and operations costs by automating many of the manual configuration and policy management tasks that are traditionally completed by humans.

What is Networking ?

Networking is the process of connecting computer systems and other electronic devices together to allow the transfer of data between them. It is the basis for digital communication, allowing devices to communicate with each other over a physical or wireless network. This type of communication is useful for sharing information between users, allowing for more efficient collaboration and the sharing of resources.

This automation ensures that network resources such as printers are used correctly and that individualized configurations can be applied with minimal manual input. Additionally, SDN increases physical access to all network devices, allowing for more efficient and cost-effective management of the network.

To learn more about Networking

https://brainly.com/question/29338740

#SPJ4

what is a commonly used technology for data collection?

Answers

Data collection can be accomplished through multiple methods with surveys being one of the commonly used techniques.

How is this used?

They may be executed via an online, phone, email or in-person process and offer insights into a broad array of fields such as people's convictions, inclinations, conduct, and demographics.

In addition to this widely chosen technique, sensors are instrumental in collecting information including but not limited to temperature, humidity and light properties for various applications like environmental monitoring, agriculture and industrial processes. Also capable is web analytics tracking user behavior on websites and social media platforms.

Read more about data collection here:

https://brainly.com/question/26711803

#SPJ1

after adding data to a table where a filter is applied, what should you do to filter the new data?

Answers

The correct answer is  Anything in the PivotTable can be clicked. A pane called PivotTable Fields displays. Choose Move to Report Filter by right-clicking the field in a section of the PivotTable Field List.

A MicroStrategy report's report filter is the component that screens the data in your data source to determine whether it should be used in the computations of the report findings or not. A filter is a programme or portion of code used in computer applications that checks each input or output request for a set of qualifying criteria before processing or forwarding it The main difference between report filters and view filters is how they are evaluated by the system. You can filter the data that has been retrieved from the data source using report filters, a standard MicroStrategy reporting capability.

To learn more about Report Filter click on the link below:

brainly.com/question/14294621

#SPJ4

what is sidebar overview?

Answers

A sidebar overview is a summary or preview of content in a sidebar, commonly used in web design, software interfaces, and content management systems to help users navigate efficiently.

A sidebar overview is a summary or preview of the content that appears in a sidebar, typically on a website or software interface. The sidebar overview provides a quick and convenient way for users to access or navigate through the content, without having to go through the main page or menu. The sidebar overview may include headings, subheadings, links, images, or other relevant information that helps the user find the content they are looking for. The sidebar overview is often customizable or collapsible, so that users can adjust it according to their preferences or needs.

Sidebar overviews are commonly used in web design, software interfaces, and content management systems to provide users with an efficient way of navigating through the content.

Sidebar overviews can also be used to provide a quick summary or preview of the content, which can be helpful for users who want to get an idea of what the content is about before diving into it.

Lear more about software here:

https://brainly.com/question/30033053

#SPJ4

which piece of information is safest to include on your social media profile cyber awareness

Answers

It's best to keep your social networking profile's disclosure of your favorite film to a minimum.

What does a risk in  cyber awareness mean?

Communication, data, or data (or control) systems may lose their security, integrity, or availability, which could have a detrimental effect on an organization's operations (such as its aim, functions, image, or reputation), assets, workers, or other organizations.

Why is it necessary to be cyber-aware?

It aids in defending the organization ’s information, systems, and networking against harmful attacks and online dangers. Employees that attend in security awareness training appreciate the meaning of cybersecurity and also how to recognise possible threats and take appropriate action.

To know more about cyber awareness visit:

brainly.com/question/30156504

#SPJ4

Exercise 5.13: consecutive Language/Type: $ Java if/else method basics return Author: Leslie Ferguson (on 2019/09/19) Write a method named consecutive that accepts three integers as parameters and returns true if they are three consecutive numbers that is, if the numbers can be arranged into an order such that there is some integer k such that the parameters' values are k, k+1, and k+2. Your method should return false if the integers are not consecutive. Note that order is not significant; your method should return th same result for the same three integers passed in any order. For example, the calls consecutive(1, 2, 3), consecutive(3, 2, 4), and consecutive(-10, 8, -9) would return true. The calls consecutive(3, 5, 7), consecutive(1, 2, 2), and consecutive(7, 7, 9) would return false. NMOON Type your solution here: 1 public boolean consecutive(int a, int b, int c) { int max = Math.max(a, Math.max(b, c)); int min = Math.min(a, Math.min(b, c)); int mid = a + b + c - max - min; return max == mid + 1 && mid == min + 1; } O Show Header

Answers

The "consecutive" method in Java accepts three integers as parameters and returns true if they are three consecutive numbers that can be arranged in order such that there is some integer k such that the parameters' values are k, k+1, and k+2.

What is the purpose of the "consecutive" method in Java?

The purpose of the "consecutive" method is to determine whether three integers are consecutive or not.

What will be the output of the "consecutive" method if the integers passed are 3, 4, and 5?

The "consecutive" method will return true if the integers passed are 3, 4, and 5 since they are consecutive numbers that can be arranged in order such that there is some integer k such that the parameters' values are k, k+1, and k+2.

Learn more about Java here:

brainly.com/question/29897053

#SPJ4

how to change text into binary?

Answers

These products are the least expensive on the industry, and they frequently don't need to be installed. It only takes a few minutes to buy, set up, and install it in your window.

How does a conditioner work?

The conditioner is often applied after washing your hair. The purpose of shampoo is to remove sweat, dead skin, and hair products; conditioner also shields the hair shafts from harm. The majority of shampoos include harsh chemicals that damage hair follicles. For those with extremely dry hair, co-washing is advised treating the hair using condition only; omitting the shampoo. breakable hair, such as full of chemicals hair. persons with textured or curly hair

What do windows do?

A windows manager oversees Windows as part of  a windowing system.

To know more about code visit :

https://brainly.com/question/497311

#SPJ4

what do deal-of-the-day websites offer subscribers?

Answers

Deal-of-the-day websites, also known as daily deal websites or flash sale websites, typically offer subscribers time-limited discounts on various products and services. These discounts can range from a few dollars off to significant discounts of up to 80% or more.

What is the rationale for the above response?

Subscribers to these websites receive daily emails with offers for deals on products and services such as clothing, electronics, travel, food and beverages, spa treatments, and more.

These deals are usually available for a limited time, ranging from a few hours to a few days, and are only valid for a specified period.

The deals offered on these websites are often sourced from retailers and service providers who are looking to increase their exposure and drive sales. By offering significant discounts to a large audience, these providers can attract new customers and increase their revenue.

Learn more about discounts at:

https://brainly.com/question/3541148

#SPJ1

if trays or wireways must be shared, the power adn telecom cables must be separated by a(n)

Answers

If trays or wireways must be shared, the power adn telecom cables must be separated by an insulating barrier.

What is telecom cables?

Telecom cables are cables used in telecommunications. They are used to connect telecommunications equipment, such as telephone exchanges, computers and other network-enabled devices. Telecom cables are usually made up of copper or fiber-optic cables and are used to transmit data, audio and video signals. Fiber-optic cables are used for longer distances and provide faster transmission speeds than copper cables. Telecom cables are essential for any type of communication and are used by businesses, governments and individuals to send and receive data. They are also used to connect phone lines, internet services and cable television.

To learn more about telecom cables

https://brainly.com/question/29995005

#SPJ1

Which operating system is considered a state-less? group of answer choices workstation cloud-based mobile server

Answers

The cloud-based operating system is considered a state-less. Thus, option D is correct.

What is an operating system?

An operating system is a piece of server system that typically supports computers, infrastructure, and community facilities for pieces of software. Using a specified application program connection, the programmers seek services from windows OS.

All files are kept online in stateless software. This indicates that the lost of data in the event of a computer failure will be negligible or absent. A computer that use a stateless version of windows is a Chromebook.

Therefore, option D is the correct option.

Learn more about operating system , here:

https://brainly.com/question/24760752

#SPJ1

what is many ml in a pint?

Answers

There are 568.26 mL in an Imperial Pint, which weighs 20 ounces. There are 473.18 mL in a 16-ounce American pint.

Is 2 litres equivalent to 1 pint?

You should be aware that one litre is about equivalent to 1.75 pints. Also, you should be aware that a gallon has an approximate volume of 4.5 litres (8 pints).

A pint of water is what size?

Two cups of liquid or one-eighth of a gallon make up a pint, a unit of volume and measurement. It is a unit that is used in both the British Imperial and US Customary systems of measurement to quantify volume or capacity. 2 pints are equal to 2 fluid ounces. Quart Fluid Ounces (qt.)

To know more about ounces visit:-

https://brainly.com/question/14818170

#SPJ4

What action should you take with a compressed Uniform Resource Locator (URL) on a website known to you?

Answers

The action that you should take with a compressed URL on a website known to you is to investigate the actual destination of the link by using the preview feature.

What is a URL?

A URL stands for Uniform Resource Locator. It may be characterized as a type of address of a given unique resource on the Web. It is just like a reference on the internet. It has two components, i.e. Protocol identifier and resource name.

The preview feature provides a title, description, and thumbnail for the material at the link destination. It is automatically generated. The addresses you subsequently type into your address bar of the browser is known as URL.

Therefore, the action that you should take with a compressed URL on a website known to you is to investigate the actual destination of the link by using the preview feature.

To learn more about URLs, refer to the link:

https://brainly.com/question/19715600

#SPJ1

Compressed URLs can be clicked on when they are on known, trusted websites. If you have suspicions, use a URL expander tool to check the link's full destination.

When faced with a compressed Uniform Resource Locator (URL) on a known website, your action will depend on what the URL is used for. Generally, compressed URLs are used to save space, make links look cleaner, or to track clicks. However, caution should be exercised as some compressed URLs might be used for harmful effects such as phishing attacks or malware dissemination.

If you come across a compressed URL on a known and trusted website, it is typically safe to click on the link. However, if you suspect the link might be harmful, use a URL expander tool to reveal the full URL before clicking. This allows you to see if the expanded link will direct you to a trustworthy site.

Learn more about Compressed URLs here:

https://brainly.com/question/36591960

3. how does ir exposure affect the histogram and lookup table in a digital imaging system?

Answers

In a digital imaging system, IR (infrared) exposure can affect the histogram.

Histogram: The histogram shows how the pixel values in an image are distributed. The pixel values related to the IR wavelengths may increase when an image is subjected to IR radiation. The histogram may move to the right as a result, showing an overall brightening of the image. Lookup table: For the purpose of display, the lookup table, sometimes referred to as the color table or color map, maps pixel values to color values. When an image is exposed to IR radiation, the lookup table may assign colors to some pixels that are not accurate representations of the colors in the scene due to the elevated pixel values associated with IR wavelengths.

Learn more about Radiation here:

https://brainly.com/question/13934832

#SPJ4

question: 1 how do you initialize an array called arr of 5 ints with default values? int[] arr = new int[6]; int[] arr = new int[5]; int arr = new int[5]; int arr = new int;

Answers

To initialize an array called "arr" of 5 integers with default values, you can use the following code:

int[] arr = new int[5];

This generates a 5-dimensional integer array with 0 as the default value for each element. This is a quick breakdown of the code, The declaration int[] makes array an integer array. A new integer array of size 5 is produced by new int[5]. Each entry in the array has a default value of 0, which is 0.Observe the following in the code you provided, Integer array of size 6 is created when int[] arr = new int[6] rather than 5.Invalid syntax includes int arr = new int[5] and int arr = new int. Instead of being declared as a single integer, the variable arr should be an array.

Learn more about array here:

https://brainly.com/question/14291092

#SPJ4

which is an accurate description of digital enhancement features?

Answers

Software feature additions are either I unique features created for Sprint or (ii) feature enhancements that significantly increase a software.

What is Software Enhancement Features?

When referring to End Users, "Software License" includes I the software license from the supplier that is Exhibit A of this Addendum, (ii) the shrinkwrap license from the supplier that is packaged with or otherwise incorporated into the software, and (iii) any applicable third-party software licenses.

As used in this Agreement, the phrase "Software License" does not refer to Sprint's license for internal use of the Software, the terms of which are contained in this Agreement.

Any commercially available upgrade, improvement, modification, patch, fix, alteration, improvement, correction, release, new version, or other change to the software is referred to as a "software upgrade."

Therefore, Software feature additions are either I unique features created for Sprint or (ii) feature enhancements that significantly increase a software.

To learn more about Enhancement, refer to the link:

https://brainly.com/question/10678373

#SPJ1

osha provides rules regarding information on the technology of the process which must include

Answers

Process protection records must include statistics on the dangers of the fairly hazardous chemical compounds used or produced by the process, infor- mation on the technology of the process, and statistics on the gear in the process.

What is the OSHA procedure safety administration Standard?

As a result, OSHA developed the Process Safety Management (PSM) fashionable (issued in 1992), which covers the manufacturing of explosives and tactics involving threshold portions of flammable liquids and flammable gasses (10,000 lbs), as well as 137 listed noticeably hazardous chemicals.

Which of the following process security facts does OSHA 1910.119 require?

§ 1910.119 Process safety administration of noticeably hazardous chemicals. Purpose. This part consists of necessities for stopping or minimizing the penalties of catastrophic releases of toxic, reactive, flammable, or explosive chemicals. These releases can also result in toxic, furnace or explosion hazards.

Learn more about technology here;

https://brainly.com/question/25110079

#SPJ4

what is name drawing generator

Answers

Using a name generator can be a quick and simple approach to create a false identity for contacts with people or organizations that you'd like not to have access to their true names, such as web signups.

How is DrawNames put to use?

It functions exactly like the traditional name-drawing approach, but you'll never draw your own name. It doesn't matter what sequence people are joined to the group in. If you draw names with us each year, the organizer can create the new group from the members of the previous one.

DrawNames: Is it safe?

Your data is safeguarded and saved by DrawNames.com in the following ways: We take great care with your personal details. This requires us to adopt appropriate organizational and technical measures, among other things.

To know more about name generator visit:

https://brainly.com/question/15071187

#SPJ4

The statement:int grades [] = {100, 90, 99, 80};shows an example of:

Answers

The statement int grades[] = {100, 90, 99, 80}; is an example of an array initialization in the C or C++ programming languages.

What is array?

In computer programming, an array is a collection of elements, usually of the same data type, that are grouped together under a single variable name. Each element in an array is identified by its index, which is a number that represents its position in the array. Arrays are a fundamental data structure used in programming to store and manipulate large amounts of data efficiently. They can be used to represent lists, tables, matrices, and other types of data structures.

Here,

An array is a collection of elements of the same data type that are stored in contiguous memory locations. In this example, the array is named grades and it contains four integer elements, {100, 90, 99, 80}, enclosed in curly braces and separated by commas. The square brackets [] indicate that this is an array and the data type of the elements is int.

This statement initializes the grades array with the values {100, 90, 99, 80}. Each value can be accessed by its index, which starts at 0. For example, grades[0] is 100, grades[1] is 90, and so on. Arrays are commonly used in programming for storing and manipulating collections of data.

To know more about array,

https://brainly.com/question/13950463

#SPJ4

How to substring function in python

Answers

An excerpt of text from a string is referred to as a substring in Python. YourString[StartingIndex:StoppingIndex:CharactersToSkip].

In Python, how do you choose a substring?

Strings can be divided in Python by setting the start and end indexes inside square brackets and separating them with a colon. This is similar to how arrays and lists are divided. This gives you a string's original substring back.

Is Python capable of using substring?

The section of a string known as a substring. A substring can be created, checked to see if it includes one, and its index can all be determined using different methods provided by the Python string. In this tutorial, we'll examine a variety of substring-related procedures.

To know more about substring in Python visit :-

https://brainly.com/question/30214701

#SPJ4

which method will allow you to export an individual layer as a png?

Answers

To export an individual layer as a PNG in Adobe Photoshop, you can hide all other layers and use either the "Export As" or "Save for Web" feature.

To export an individual layer as a PNG, you can first hide all the other layers, and then use the "Export As" or "Save for Web" feature in your graphics editing software to save the layer as a PNG file.

Open your graphics editing software (such as Adobe Photoshop or GIMP) and open the file containing the layer you want to export as a PNG.In the Layers panel, locate the layer you want to export and make sure it is visible.If the layer is grouped with other layers, you may need to ungroup it or temporarily move it to a separate layer group so you can easily hide the other layers.Hide all the other layers in the Layers panel by clicking the eye icon next to each layer.Select the layer you want to export in the Layers panel.In Photoshop, you can use the "Export As" feature by going to File > Export > Export As. In GIMP, you can use the "Save for Web" feature by going to File > Export As > Select File Type as PNG.In the Export As or Save for Web dialog box, choose PNG as the file format.Choose your desired settings, such as the file name, file location, and any other export options you want to use.Click "Export" or "Save" to export the selected layer as a PNG file.Make sure to unhide all the other layers in the Layers panel once you're done exporting the individual layer.

Learn more about PNG here:

https://brainly.com/question/20293277

#SPJ4

how to calculate annual worth in excel

Answers

To calculate annual worth in Excel, you can use the following steps:

Open a new Excel spreadsheet and enter your data into the columns or rows as needed.In a blank cell, enter the formula "=PMT(rate,nper,pv,fv,type)" where "rate" is the interest rate, "nper" is the number of periods, "pv" is the present value, "fv" is the future value, and "type" is the type of payment (0 for end of period, 1 for beginning of period).Replace the values in the formula with the appropriate cell references or numbers. For example, if your interest rate is in cell A1, your number of periods is in cell B1, your present value is in cell C1, and your future value is in cell D1, your formula would be "=PMT(A1,B1,C1,D1,0)".Press "Enter" to calculate the annual worth. The result will be displayed in the cell where you entered the formula.

By using the PMT function in Excel, you can easily calculate the annual worth of an investment or loan.

For more information about Excel, visit:

brainly.com/question/24749457

#SPJ11

academic search premier is what kind of resource? group of answer choices a subject database a general database a library catalog a search engine

Answers

Academic Search Premier is a type of subject database.

It is an academic full-text database that offers access to thousands of scholarly articles from a variety of subjects. It includes a wide range of topics, such as engineering, computer science, education, humanities, and social sciences. using the database itself to collect and process the data Also, the main tools offered to manage the database are included in the DBMS programme. A database system can be defined as the collection of the database, the database management system, and the related applications. Frequently, the term "database" is also used in an ambiguous manner to refer to any DBMS, the database system, or a database-related application.

Learn more about Database here:

https://brainly.com/question/29412324

#SPJ4

What is calamity momentum capacitor?

Answers

Calamity, momentum, and capacitor are all different terms that are used in different contexts.

Calamity is a term used to describe a disastrous event or a catastrophe. It is often used to refer to natural disasters, such as hurricanes, earthquakes, or floods.Momentum is a term used in physics to describe the quantity of motion of a moving body. It is equal to the mass of the body multiplied by its velocity, and is a vector quantity, meaning that it has both magnitude and direction.Capacitor is a term used in electronics to describe a component that stores electrical energy in an electric field. It is made up of two conductors separated by an insulator, and is used in a variety of electronic circuits to store and release electrical energy.

For more information about capacitor, visit:

https://brainly.com/question/27393410

#SPJ11

Other Questions
a normal distribution has a mean of = 70 with = 12. if one score is randomly selected from this distribution, what is the probability that the score will be less than x = 76? what are regulations? and how do they relate to the bureaucracy? which of the following activities is the best example of a project? group of answer choices A. writing a new book on project management B. processing insurance claims C. producing automobiles continually D .monitoring product quality What happened during the Panic of 1819? What were the Nazi doctors doing with the people sent to the Concentration Camps? Lets go Shopping!You and your friend have decided a day to the mall is in order. Answer the following questions regarding some purchases you make. Be sure to read the directions carefully and answer the questions fully to what the directions are asking you to do. This means you must prep for the day. This includes what you will wear and how your travel will look. 1. Your first plan of action is to decide what to war for the day.. You will be shopping all day. The temperature at 8 am this morning is 45 degrees. The weather man says the temperature will increase by 32 degrees by 12 pm then decrease by 14 degrees at 6pm where it remains constant. Setup an expression for finding temperature throughout the day. Find the final temperature from your expression. (Optional-Attach a picture of your favorite shirt, sweatshirt, etc.)2:Your next decision is deciding on how many 5-minute songs you can listen to while driving to the mall, which is 45 minutes away. Setup an expression to find the number of songs you can listen to on the way to the mall. Find the total number of songs you can listen to. (Optional- list your favorite song currently.)3:After listening to all your favorite tunes, you finally arrive at the mall. You cant remember how much money you have. You pull out your money. You have seven twenty dollar bills, four ten dollar bills, three five dollar bills, and eight one dollar bills. Setup an expression for the total amount of money you have. Find the total amount of money you have. 4:After counting your money. The first store you go to is a video game store. You see 4 games you would like to purchase. The first is $19.99, the second is $21.59, the third is $9.92, and the last one is $22.88. You purchase all four games. You get talking with your friend and remember that the last one you bought for $22.88 is a game your friend already has. You take that game back to the store and they charge a fee of $2.99 for returned games. Setup an expression for the amount you paid for the 4 games, the game you returned and the fee you had to pay. Find the total after you paid for the 4 games, the returned game, and the fee. (Optional list your favorite video game)5:Your friend decides you should go a clothes store next. Your friend has one hundred dollars. They pick out 10 items. The first three are $15.99, the second three are $10.40 and the last four are $4.50. Explain how you would estimate if your friend has enough money to buy all the items. Then setup an expression to find out if your friend has enough money to buy all the items. Lastly, find the total from your expression. 6:After you both have bought some items you decide it is time for some candy at the candy store. You decide to buy 5 and 1/2 pounds of jelly beans. Your friend suggests that you share your jelly beans with your other friends tomorrow. You decide to give each friend of a pound. How many friends can you share your jelly beans with? Set up an expression to find the number of friends you can share it with. (Optional what is your favorite candy?)7:Giving to your church is part of Gods will. Genesis 14:19-20 says, And he blessed him and said, Blessed be Abram by God Most High, Possessor of heaven and earth; and blessed be God Most High, who has delivered your enemies into your hand! And Abram gave him a tenth of everything. Before you went to the mall you should have set side 10% or 0.1 of your money you had. From question three, how much money should you bring to church? Setup an expression to show the amount you should bring. Consider the solid obtained by rotating the region bounded by the given curves about the x-axis. y = 2/7 x^2, y = 9/7 - x^2 Find the volume V of this solid. V = Sketch the region, the solid, and a typical disk or washer. (Do this on paper. Your instructor may ask you to turn in this work.) What instrument is used to measure relative humidity?a. an anemometerb. a barometerc. a wind vaned. a psychrometer How Can the Same Evidence Lead to Conflicting Advice? 2. ideally, the corporate ethics officer should be a well respected, senior-level manager who reports directly to the ceo.T/F Building high-morale organizations and building communication networks that include employees are both elements ofA) ISO 9000 certification.B) Six Sigma certification.C) employee empowerment.D) the tools of TQM. what is the ""fairness doctrine""? The mapping diagram represents a relation where x represents the independent variable and y represents the dependent variable. A mapping diagram with one circle labeled x-values containing values negative 8, negative 5, negative 1, 1, and 12 and another circle labeled y values containing values negative 4 and negative 2 and arrows from negative 8 to negative 4, negative 5 to negative 2, negative 1 to negative 2, 1 to negative 2, 12 to negative 4, and 12 to negative 2. Is the relation a function? Explain. Fifty cities provided information on vacancy rates (in %) in local apartments in the following frequency distribution.Vacancy Rate (%) Relative Frequency0 < x 3 0.023 < x 6 0.166 < x 9 0.169 < x 12 0.2412 < x 15 0.42a-4. what proportion of the cities had a vacancy rate of more than 9%? (round your answer to 2 decimal places.) What are the defining characteristics of an organization? the navigation acts of the 1650s and 1660s were designed to regulate colonial trade in order to what happens to the organic substances present in seawater? (choose all that apply.) what does faber's meaning in the text about passionate lips and fists in the stomach mean A 6.0-kg rock is dropped from a height of 9.0 m. At what height is the rock's kinetic energy twice its potential energy? If you draw a radius from the center of the circle to the point of tangency, what is the measure of the angle formed by the radius and the tangent line?ResponsesA Cannot be determinedB 45C 90D 180IMAGE ATTACHMENT