Me pueden decir todo lo que sepan sobre las redes informáticas porfa? De preferencia que sea algo largo

Answers

Answer 1

Answer:

Una red informática es una fusión de varios sistemas electrónicos técnicos, principalmente independientes que permite que los sistemas individuales se comuniquen entre sí. El objetivo aquí es el intercambio de recursos como impresoras de red, servidores, archivos y bases de datos.  

La estructura de red más conocida es Internet, y los protocolos a través de los cuales se transmite la información más conocidos son el TCP (Protocolo de control de transmisión) y el IP (Protocolo de Internet), pero varios otros protocolos también desempeñan funciones importantes en Internet. Internet en sí no es una red homogénea, sino que consta de un gran número de subredes, algunas de las cuales tienen diseños muy diferentes, que solo tienen en común las capas de protocolo superiores y que manejan la transmisión de datos de usuario en las capas de protocolo inferiores en muy diferentes caminos.


Related Questions

Which software documentation guideline did the IEEE establish?
A.
Avoid spelling errors.
B.
A glossary should be present to define technical terms and acronyms.
C.
The font has to be in black.
D.
Documents should not have page numbers.

Answers

Answer:

B

Explanation:

I am big brain

Hello Everyone,
Please I have been have problems answering this question. I do not know if anyone could be of help to me.
Describe the difference between objects and values using the terms “equivalent” and “identical”. Illustrate the difference using your own examples with Python lists and the “is” operator.

Describe the relationship between objects, references, and aliasing. Again, create your own examples with Python lists.

Finally, create your own example of a function that modifies a list passed in as an argument. Describe what your function does in terms of arguments, parameters, objects, and references.

Create your own unique examples for this assignment. Do not copy them from the textbook or any other source

Answers

I can answer the first question a bit:
Objects are nothing but instance of a class. To know two objects are identical are not, use the is operator.
Is operator: The is operator is used to compare the two objects that are identical or not. The is operator returns true, if the variables on either side of the operator point to same object. If the variables on either side of the operator point to different object then it can also return true.
Value: Value is also an object that assign to a variable. Comparing to objects through === operator.
The term equivalent means.... is used to when the two operators are equal or not , if equal condition returns true.

Sorry this ain't bout HW but how do I get this off my screen it's pretty annoying

Answers

Have you tried the esc button? Or restart your cp

Examples and meaning of external hardware.​

Answers

Answer:

External hardware devices include monitors, keyboards, mice, printers, and scanners. external hardware devices are usually called peripherals.

5 examples of hardware?

Mouse, Keyboard, Monitor, Printer, USB, CD Drive, RAM, Hard Drive, Joystick, Scanner, DVD, CPU, Motherboard, Etc.

Explanation:

Hope this help have a good rest of your  day

Select the best answer to the following question.
Remote data storage and the ability to access data from any device using the Internet is called

Answers

Answer:

I think its called "cloud computing"

Answer:

cloud computering

Explanation:

Click the above image
Ask the user to enter two numbers. The first number is for the multiplication table. The second number is the number of rows to display.

Use a for loop to print the table.

Answers

Answer:

Follows are the cdo0de to this question:

import java.util.*;//package  

public class Table //defining class Table

{

   public static void main(String[] asx)//main method  

   {

       int x,y,i;//defining integer variables

       Scanner bg=new Scanner(System.in);//creating Scanner class object

       System.out.print("Enter first number: ");//print message  

       x=bg.nextInt();//input value

       System.out.print("Enter Second number: ");//print message

       y=bg.nextInt();//input value

       for(i = 1; i <= y; i++)//defining for loop for print Table

       {

           System.out.printf("%d * %d = %d \n", x, i, x * i);//calculate and print table

       }

   }

}

Output:

Enter first number: 5

Enter Second number: 3

5 * 1 = 5  

5 * 2 = 10  

5 * 3 = 15

Explanation:

In the above code, three integer variable "x,y, and i" is declared, in which "x,y" variable is used to input value from the user end, and after input, the value the for loop is used, in which the second variable "y" count the rows, and "i, x" variable is used for calculates the multiplication of the table.  

Helppppp plzzzz it's computer science helpp plzzz

Answers

1. String

2. "is assigned to"

PlEASE HELP!

Identify in the space below three rules you feel are most important for deciding what personal information is
appropriate to post online.

Answers

Answer:

.

Names. Be careful how you use your name. Avoid using your full name. Even a nickname could spell trouble -- for instance, if it says something suggestive about your character, if it's a name you already use with others who know your real identity, or if it's made up from your real name (say, from your initials). First names are best, unless yours is extremely unusual. These days, many people do use their full names for online posting -- on social media sites and blogs for example. Just know that in doing so you're raising the risk of becoming an identity theft victim.

Photos. Bearing in mind Golden Rule #1, don't post photos you wouldn't want everyone to see. Full face, high resolution photos may be "snagged" (copied) and used for identity theft. Some people don't know how easy this is to do with any photo, with just a couple of clicks. Also, as a matter of etiquette, don't post photos of others without their permission, unless you're prepared for the consequences if the other person doesn't think it's funny. For preference, use photos in which identities are obscured. And, as a general rule, don't post photos of children online (especially not other people's children without permission). If you want to share photos of your kids, put them in a private online album, accessible by invitation or password. Or email them directly to your friends.

Explanation:

Charles was supposed to present his PowerPoint slides to his classmates in a classroom, but now he has to present in the auditorium in front of his entire grade. What change will Charles have to make when he presents his slides?

He will have to change his topic.
He will have to rearrange his slides.
He will have to speak more loudly and clearly.
He will have to tell his friends about the change.



HELP ASAP

Answers

Answer:

it is c

Explanation:

cus of the long and huge hall of u have in ur school

Answer: C

Explanation: Because he will need the whole grade to hear, or you know grab a mic :D HOPE YOU ENJOY YOUR DAY

Plzzzzz helppppp hurry plzzzzzzzz

Answers

The second one is A.

what are the different types of document required for mail merge?

Answers

Answer:

More Information. A mail merge is used to create form letters, mailing labels, envelopes, directories, and mass e-mail message and fax distributions. There are three documents that are involved in the mail merge process: the main document, the data source, and the merged document.

Explanation:

Decrypt this message: P ht uva h zwf
It has been encrypted with a shift of 7 (remember each letter needs to go backwards.
uhhh pls help with this ill mark brainliest

Answers

translation: I am a spy

is a way og saving a file so it can be used by a different program​

Answers

Answer:

what are you even asking

How do I calculate this square footage?

Answers

Answer:

To calculate it, you have to break it apart. Sorry for the bad writing but after you break it apart, you multiply the smaller squares. Then with all of the smaller areas, add them together for the final answer which in this case is 456.

A
is the smallest of the network types and provides connectivity for one person’s devices.

Answers

Answer:

Personal Area Network (PAN)

Explanation:

A  Personal Area Network (PAN) is the smallest of the network types and provides connectivity for one person’s devices.

A personal area network refers to a computer network that is used for interconnecting various electronic devices that are centered on the workspace of an individual. A PAN enables data transmission among the following devices: 1. Computers

2. Smartphones

3. Tablets

4. Personal digital assistants.

What is the most important function of a network operating system (NOS)?

Answers

Answer:

One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.

Explanation:

One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.

What is network operating system?

An operating system for computers known as a "network operating system" (NOS) is primarily made to handle workstations, personal computers, and occasionally older terminals that are linked together over a local area network (LAN).

A NOS's supporting software enables resource sharing and communication amongst various networked devices. A NOS's usual hardware configuration consists of several personal computers, a printer, a server, and file servers that are linked by a local network.

Because earlier iterations of the fundamental operating system weren't created with network use in mind, network operating systems

Therefore, One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.

To learn more about network operating system, refer to the link:

https://brainly.com/question/28356173

#SPJ2

A computer game picks a random number between 1 and 100, and asks the player to guess what the number is. If the player makes a correct guess, the game congratulates them, and stops. If the player does not make a correct guess, the game tells the player that their guess is either too high, or too low. If the player guesses with an answer that is not a number between 1 and 100, an error message is displayed. The game continues to give the player chances to guess, until the player guesses correctly. You are going to plan an interactive program to implement this game. do this using scratch

Answers

Answer:

In Python:

import random

computerguess = random.randint(1,101)

userguess = int(input("Take a guess: "))

while not (userguess == computerguess):

   if userguess<1 or userguess>100:

       print("Error")

   elif not (userguess == computerguess):

       if userguess < computerguess:

           print("Too small")

       else:

           print("Too large")

   userguess = int(input("Take a guess: "))

print("Congratulations")

Explanation:

This imports the random module

import random

Here, a random number is generated

computerguess = random.randint(1,101)

This prompts the user for a guess

userguess = int(input("Take a guess: "))

The following loop is repeated until the user guess correctly

while not (userguess == computerguess):

If user guess is not between 1 and 100 (inclusive)

   if userguess<1 or userguess>100:

This prints error

       print("Error")

If the user guessed is not correct

   elif not (userguess == computerguess):

If the user guess is less

       if userguess < computerguess:

It prints too small

           print("Too small")

If otherwise

       else:

It prints too large

           print("Too large")

This prompts the user for a guess

   userguess = int(input("Take a guess: "))

The loop ends here

This prints congratulations when the user guess correctly

print("Congratulations")

libre office is what program​

Answers

I’m not 100% sure what this question is asking, but I believe the answer would be “an open-source office productivity software”.

Document accurately describes the differences between servers and computers and between local and wide area networks. Document provides at least four suggestions including password managers and safe browsers.

Thinks someone could help me out with this? ​

Answers

Answer:

Cell towers and internet uses allow local and wide area networks, but they also allow you to steal IP and things like that.

Explanation:

This is quite difficult. I appologize if I get this wrong.

(Also if you upload a file for someone to answer, and they give you a link, don't click on it!! They track your IP address and things like that!)

Can someone urgently help me with my java code (I WILL GIVE BRAINLIEST)?! Ive been working on it for hours and its not working! (please give an actual answer...)

*examples of required output at the bottom*

code: public class CircularList
{
private ListNode head;
private ListNode tail;
private int size;







public CircularList()

{

head = tail = null;

size = 0;

}





public int size()

{

return size;

}





public boolean isEmpty()

{

return (size == 0);

}





public int first()

{

if (head != null) {

return head.getValue();

}

return -1;

}




public Integer last()

{

if (tail != null) {

return tail.getValue();

}

return -1;

}



public void addFirst(Integer value)

{

head = new ListNode(value, head);

if (tail == null) {

tail = head;

}

size++;

}





public void addLast(Integer value)

{

ListNode newTail = new ListNode(value, null);

if (tail != null) {

tail.setNext(newTail);

tail = newTail;

} else {

head = tail = newTail;

}



size++;

}





public void addAtPos(int pos, Integer value)

{

if (pos == 0) {

addFirst(value);

return;

}

if (pos <= 0 || pos > size) {

return;

}

if (pos == size) {

addLast(value);

return;

}



ListNode ptr = head;

for(int i=0; i = size) {

return retVal;

}

if (pos == 0) {

return removeFirst();

}

ListNode ptr = head;

for(int i=0; i
ptr = ptr.getNext();

}

retVal = ptr.getNext().getValue();

if (pos == size-1) {

tail = ptr;

tail.setNext(null);

} else {

ptr.setNext(ptr.getNext().getNext());

}



size--;

return retVal;

}





public int findNode(Integer find)

{

ListNode ptr = head;

for(int pos=0; pos
if (ptr.getValue() == find) {

return pos;

}

ptr = ptr.getNext();

}

return -1;

}




public void rotate()

{

addLast(removeFirst());

}




public String toString()

{

String output = "";

ListNode iter = head;

while(iter != null) {

output += String.format("%d ", iter.getValue());

iter = iter.getNext();

}

return output;

}



}

size = 6 first = 50 last = 60
50 20 10 40 30 60

removeFirst = 50
size = 5 first = 20 last = 60
20 10 40 30 60

removed = 30
size = 4 first = 20 last = 60
20 10 40 60

size = 4 first = 20 last = 60
20 10 40 60

found at -1
removed = -1
size = 4 first = 20 last = 60
20 10 40 60

size = 4 first = 10 last = 20
10 40 60 20

Answers

Answer:

code 345code 4537

Explanation:

ANSWER ASAP!!!!!!!!

Which statement regarding dialogues in multiplayer games is true?
A.
Dialogues are based only on players’ actions.
B.
Dialogues are restricted to the game’s characters.
C.
Dialogues may be between the game’s characters as well as the players.
D.
Dialogues serve the sole purpose of advancing the storyline.
E.
Dialogues are based only on events that have occurred in the game.

Answers

Answer:

The answer to this question will mostly be E

Discussion Topic
How does social media affect the process of globalization? Give examples. In what
ways does social media help in creating global communities? Discuss other positive
influences of social media. What might be the adverse effects of excessive use of social
media?

Answers

Answer:

Social media positively affects and impacts the process of globalization. ... Global communities is a social infrastructure tool and as social media helps in strengthening social relationships and bringing people and communities together it leads to creating a string global community.

HOW TO USE THIS IN A STORY CAN ANYONE HELP PICK % WORD FROM THE PAGE AN MAKE A STORY WHY DO I LIKE SUMMER ?????////
get 60 piont if you if you help meeeeeeeeeeee
ASAPPPPPPPPPPPPPPPPPPPPPP


The sunshine
Light mornings
Long light nights
BBQs in the garden
The smell of sun cream
Pretty wildflowers
Cloudless blue skies
Going to the beach
Feeling the warm sun on your face
Summer clothes
Sunglasses
Picnics in the park
Long walks
Sitting out on a warm evening
Eating fresh tasty salads
Drinking sangria
Orange glowy sunsets
Fresh air
Exploring new places
Ice cream (or Dairy Free alternative)
Summer playlists
Road trips
Eating fresh strawberries
Ice cold drinks on a hot day
The smell of freshly cut grass
Not having to wear a jacket when out
Autumn is just around the corner
Holidays at home or abroad
Salty sea breezes
Summer always seems to make people happier

Answers

Answer:

Picnic in the Park

Explanation:

Parks are my favorite spots to chill or go for a stroll. Parks make walking in a neighborhood more fun and offer space for common sports, promoting physical activity. They have hiking trails and other amenities to get people moving. Every place, in my opinion, needs some green space where people can get away from the crowds. I live near a park, so if the weather is good, I usually go there once or twice a week. Therefor, my favorite summer activity is going to the park.

a___ is a placeholder where you can enter text to manipulate and give new graphical effects.​

Answers

Answer:

A "text box" is a placeholder where you can enter text to manipulate and give new graphical effects

Certain programs, such as Adobe Acrobat
Reader, may install additional tabs to the
Ribbon. These tabs are called add-ins.
True or False

Answers

Answer:

true

Explanation:

mark brainliest ☺☺☺☺☺☺

list any four e-commerce website​

Answers

Answer:

Amazon. Founded in the US in 1994, Amazon started as an online bookstore that later diversified to products including media, electronics, apparel, furniture, food, toys, and jewelry.

eBay. ...

Walmart. ...

Etsy. ...

Home Depot. ...

Target. ...

Best Buy. ...

Wayfair.

Answer:

I'm sorry is this a question?

how can i help?

Explanation:

Select all the correct answers.
Which TWO of the following are recommended practices to protect users' privacy while using email services?
Avoid forwarding a personal emails to others.
Avoid forwarding jokes and trivia using email.
Avoid using webmail if you have an email client on your computer.
Avoid opening emails from unrecognized senders.
Avoid using webmail in the workplace:

Answers

Answer: Avoid forwarding a personal email to others and most likely Avoid forwarding jokes and trivia using email.

The recommended practices to protect users' privacy while using email services are options A and C: avoid forwarding a personal emails to others and avoid using webmail if you have an email client on your computer.

What do you mean by term E-mail?

An E-mail is refers to as the communication source. It is a specialized computer network that stores, processes, and send the material from one person to another within seconds..

E-mail is considered as the computer equivalent but it has many advantages like timeliness and flexibility.

Moreover, the content of email include text, files, images or other kind of attachments send by the specified person to the one or more than one groups.

In order to protect the personal data of the user, it is recommend that people should note share their personal information with other and specially the young generation do not use webmail if the another party already utilize your computer.

Nowadays more frauds are happen due to the fact that people are more indulge in these communications for their better advancements. So, we have to take every step very carefully.

Therefore, correct options are A and C.

Learn more about E-mail, refer to the link:

https://brainly.com/question/13313275

#SPJ2

round 74,361 to the nearest 10​

Answers

Answer:

74,400 i think

Explanation:

After inserting a video into your slide how can you test it

Answers

Explanation:

How to insert video into PowerPoint

Click on the slide you want, then go to Menu > Insert.In the top right corner, click Video > Video on My PC.Find the video you want to add and click “Insert”.Adjust the settings in the Video Format toolbar to make sure it plays the way you want.

Complete the sentence.
One way to increase the reliability of a hard disk drive is by making it part of ____
an optical array
a capacitator
a RAID
an analog ray

Answers

I think it is the capacitor

Answer: It is raid

Explanation:

Took the test for edge

Other Questions
Which inequality has -12 in its solution set?BDX+6 -10X+ 55-4ILL MARK BRAINIEST A result of the Freedom Summer campaign was that? answer to (4f+1)(4f+1) What were the long-term influences of the New Deal on American society? How does gene flow directly contribute to evolution? 2. PART B: Which TWO pieces of evidence from the text best support your answer to Part A?wan TUO 100A. "The best way to learn about something is to live it." (Paragraph 2yumaB. "Some people wouldn't think twice about smashing such low quality items tobits for decorating Steampunk Jewelry..." (Paragraph 5)C. "...when a lamp has to be filled and cared for, one is naturally more mindful ofwhen it's really needed, instead of simply using it by habit." (Paragraph 7)D. "Clothes are incredibly intimate. They influence how we move..." (Paragraph 13)E. "Some things can only be learned by experience repeated so often it becomesod monone second nature." (Paragraph 21) novembroF. "How wearing long skirts can become an extra sense for experiencing the world,the way cats use their whiskers." (Paragraph 21) Question 5 of 10Based on the root enni, what is the meaning of the word biennial?A. Happens every two yearsB. Happens dailyC. Happens once a yearD. Happens twice a monthSUBMIT ANSWER ASAPP GIVING BRAINLIEST AND STUFF!Write a short paragraph about electrical current using the terms conductor and insulator. In Act III of the play, Mark Antony speaks at the funeral of his friend, Julius Caesar.How is the text presentation of this scene different from the film presentation? In the text, the Roman citizens are unwilling to listen to Antony's speech. In the film, they are eager to hear what he has to say. The text provides only Antony's words. In the film, Antony's inner thoughts are also clear. The stage directions in the text provide little description of Antony's emotions as he speaks. In the film, Antony conveys strong feelings.The text has dialogue in which individual citizens speak in reaction to Antony's words. In the film, the citizens react as a group. In a school of 310 students, 70 of them are in the drama club, 190 of them are in a sports team and 50 students do drama and sports. Find the probability that a student chosen at random isnt in the in tje drama club or the sports team Expand t (4t - 4 ) answer if you can plz In the context of the text, what obstacles did Wilma Rudolph overcome to become anOlympic gold medalist? How do you think she was able to overcome these obstacles?Describe a time when you overcame something difficult to succeed. How were you ableto overcome your obstacle? Mr. Green baked 24 cookies. 5 sixths of the cookies were oatmeal. How many oatmeal cookies did Mr. Green bake? What would the cross sections be of a triangular prism cut diagonally NOT through the base?A circleB ellipseC rectangleD squareE trapezoidF triangle French articles! Please help! Simplify the expression.t+2+6t what are some of your long-term goals? HELP ME !! WHOEVER GETS THE RIGHT ANSWER I WILL MARK BRAINIEST!! 11. "So he went on, tearing up all the flowers from the garden of his soul, and setting his heelupon them." (chapter 22)12. "There is one kind of prison where the man is behind bars, and everything that he desires isoutside; and there is another kind where the things are behind the bars, and the man is out-side." (chapter 27)HI I NEED LITERARY DEVICE FOR ALL! pls What is causing mount everest to grow taller each year