TCP is known to be a type of a connection-oriented protocol, while UDP is a connectionless protocol. TCP and UDP provide data transport between hosts.
TCP and UDP are known for their speed, as TCP is slower and can retransmit lost data packets than UDP. UDP is said to be faster, simpler, and efficient protocol.Data transport is simply known to be an the energy problem. It is the amount of energy needed to transport a bit from the closest neighbor.
Data Transport Service gives a reliable connection for moving large amounts of data at very fast speeds.
Learn more from
https://brainly.com/question/17695822
A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer’s technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors.
Answer:
D. The method for retrieval is dependent on the specific app or device’s operating system.
________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Human-computer interface d. Computer-aided design e. Total ownership
Answer:
a) reverse engineering
Animals living in burrows under the ground is an interaction between the biosphere and the
Answer:
Geosphere
Explanation:
The geosphere is made up of the rocks and minerals of the earth found in the ground.
how important are operating system in our devices?
____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.
Answer:
Secrecy
Explanation:
Options:
A) Necessity.
B) Secrecy.
C) Integrity.
D) Encryption.
B) Secrecy Is correct answer
(Hope this helps can I pls have brainlist (crown)☺️)
A client is looking to maximize value from its Cloud investments by baselining, profiling, and prioritizing its human capital needs.Which myNav module will help this client?
myNav is to be present inn the Accenture software. It aim is to helps companies manage the human, technology and business dimensions of cloud change. The myNav module that will help this client is Cloud Advisor.
Cloud Advisor is simply known to be one of the many modules within the myNav platform. It was set up to handle the difficulties of cloud for digital transformation.
These Advisors are known worldwide community of technical resources. They have a thorough knowledge of cloud technologies and practices.
Their mission is to know the trends, regulatory implications, and our clients' needs so as to help them to set goals and create plans to achieve their desired outcome.
Learn more from
https://brainly.com/question/24918185
1. What is the value of the digit 2 in the number below?
1,243 (a) 2) (b) 200) (c) 2000) (d) 20
Answer:
200
Explanation:
Let's split the number 1,243 into its values.
1,000 + 200 + 40 + 3.
To check your answer, add all the numbers together.
_2_ _.
Notice that there are "2" spaces after the 2.
This is why there are 2 zeros in 200.
Therefore, 200 is the answer.
-kiniwih426
When should you close the socket python tcp server client.
true or false windows 98 and windows xp are examples of an operating system?
Answer:
true
Explanation:
John works as an associate at a construction company. His job is to draft contracts for suppliers. Before he prints the contract, he sends it to his manager so that he can suggest any required changes. Which feature should John’s manager use to make the suggestions?
A.
Spell Check
B.
Track Changes
C.
Comments
D.
Edit
Answer: D
Hope that helped :)
Please HELP
Which of the following is not a method of data management?
A- sorting
b- filtering
c- formula's
d- graphing
formula's, Data management does not involve formulas.
What is formula?
A formula is a statement that instructs the computer what mathematical operation to carry out on a given value. Formulas are most frequently used in spreadsheet software, like Microsoft Excel, when referring to computer programs.
What is Data Management?
Data management is the process of gathering, storing, and using data in a cost-effective, efficient, and secure manner. In order to make decisions and take actions that will benefit the organization as much as possible, data management aims to assist individuals, organizations, and connected things in optimizing the use of data within the constraints of policy and regulation. An effective data management strategy is more crucial than ever as businesses depend more on intangible assets to generate value.
To know more about Data Management, check out:
https://brainly.com/question/29310787
#SPJ1
what is the kybert satellite
Answer:
i dont know....there is nothing on that piece of technology
Explanation:
The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.
Answer:
IDggK
Explanation:
How does 5G technology enhance the Internet of Things (IoT)?
Answer:
5G Will Quickly Become The New Standard For Cellular Networks. The Internet of Things (IoT) is rapidly developing and expanding. ... 5G will increase cellular bandwidth by huge amounts, making it much easier for the Internet of Things to network large numbers of devices together.
Explanation:
Hope its help
? Question Select the correct answer from each drop-down menu. Which terms complete the sentence given below? In a presentation, A. master slides b. animations c. themes can be used to an object or text on a slide.
Answer:
B
Explanation:
Animations are used for cool transitions!
In a presentation, master slides are an essential feature that allows users to maintain consistency and apply themes to objects or text on each slide.
What do they serve as?They serve as a template for the entire presentation, enabling a unified look and feel throughout. By incorporating master slides, presenters can easily make global changes to fonts, colors, backgrounds, and other design elements, ensuring a cohesive and professional appearance.
This saves time and effort by eliminating the need to individually modify each slide. Additionally, master slides facilitate efficient management of animations and transitions, ensuring a smooth and engaging presentation experience for the audience
Read more about presentation here:
https://brainly.com/question/24653274
#SPJ2
Which of the following is not a good practice for effective Internet searches? Search for specific keywords that define your topic Use quotation marks to search for exact phrases Be general in your search query to get as many results possible Use or - to include or exclude different topics
Answer:
Be general in your search query to get as many results possible
Civilization V is a game that can be won in a number of ways, including maximizing your civilization's diplomatic, scientific, or cultural standing, making it so the player is intensely focused on winning the game. This is an example of what type of immersion?
Tactical immersion
Strategic Immersion
Non-player immersion
Pseudo immersion
Answer:
Strategic Immersion
Explanation:
Strategic Immersioninvolves the player being intensely focused on winning the game and weighing all their actions in terms of maximizing their chances
Type the correct answer in the box. Spell all words correctly. Define the term loop rule. The loop rule tells us that if we sum the across all the components in a single closed path of an electrical network, the result is 0.
Answer:
91
Explanation:
Until 2016, the popular song _____ was covered by copyright law, unusually long after it was written in 1893.
A.
Happy Birthday
B.
Merry Christmas, Everyone
C.
Hava Nagila
D.
Auld Lang Syne
Answer: Happy Birthday
Explanation:
TRUE OR FALSE: Bomb threat checklists are extremely valuable and should be made available at all workstations.
Answer:
True
Explanation:
"Bomb threat checklists are extremely valuable and should be made available at all workstations. If your organization does not have a bomb threat checklist, print the sample for future reference. Keep a copy of the checklist at your workstation at all times."
Why is remixing so popular with artists and other people online?
A.
It is so popular because remixes are guaranteed to make money.
B.
It requires no skill or special tools to do.
C.
It is a legal loophole that allows them to benefit from other people’s work.
D.
It is a way to be creative without having to construct totally new pieces.
Answer:
D.It is a way to be creative without having to construct totally new pieces.
Explanation:The answer is -D- because it is true. Remixing is a way of being creative, and you don't have to make completely new pieces.
Answer:
its likely D
Explanation:
remixing allows artists to combine and change different songs without having to actually create a song their-selves
five types of conflict in the school
Answer:
Conflicts can be classified into five different types: structural, value, relationship, interest, and data [
Explanation:
Answer:
Conflicts can be classified into five different types: structural, value, relationship, interest, and data
Explanation:
follow me please
Project: On Assignment as a Web Developer
Assignment Directions:
Create a web page for a fictitious company: Widgets Inc. has hired you to make a mock-up for their new website. They are on a budget and only want to have a presence on the Internet. They do not need any fancy bells and whistles. They have sent you an email message with the basic parameters of the site.
The site should have at least three pages. They should include the landing page (commonly named index.htm), a contact page, and a "Meet the Company" page.
Each page should have an identical header containing the company name and motto: "We make widgets fun!"
Each page must include navigation back to the home page (without needing to use the Back button on the browser).
All font styles and alignment must be performed with inline CSS.
The company mascot is a dog, but there is no logo provided in this project. Any picture of a dog will do. Make sure it is prominently displayed on each page.
Each page should display in a web browser with a title.
All employees on the "Meet the Company" page can be random people's photos from the Internet. Please include Jack Sprat, President, Tom Thumb, Vice President, Sally Flag, Treasurer, and Monty Fuller, Secretary.
All text for these pages can be fake. See this website to create filler paragraphs.
Make up email addresses, but use the mail to: command as a hyperlink and display the person's name and not the actual address.
Each page should have a link to the other pages.
Link to at least three remote web pages. One of these should be formatted in an iframe.
The main page should have a sample product table including the following information:
Name Size Color Lead time Price Discount (for 10)
W-1 1X1 Blue 1 week $200.00 10%
R-2 2X2 Green 1 week $1,200.00 15%
D-2 2X3 Red 2 weeks $12,000.00 20%
Assignment Guidelines:
Projects will be assessed on following the requirements and style. Use color (creatively), at least two typefaces, headings, bold and italics, images, background colors, and so on to make your pages.
Submission Requirements:
Standard HTML
Question # 1
File Upload
Ensure that you fulfill all requirements, then upload your final web page project.
Answer:
It is not possible to upload files .html files here
computer science is a blank process
i agree... its a interesting thing to learn, just like learning an actual new language.
Answer:
yeah and it requires hard work
What color object would reflect more light?
O Red
O Black
O Blue
o White
Answer:
White
Explanation:
Red absorbs all light except red light, which it reflects
Black absorbs all light
Blue absorbs all light except blue light, which it reflects
White reflects all light because it has all colors except black.
Hope you do well!
3.5 code practice python
Answer: This chapter is about variables in Python. So a variable can be any data type. And to find the datatype of a variable we need to use below code: x =10 print (type (x)) This will output: integer Now we can covert a string into integer as below:x=input("Enter X:")But above x is considered as string, and we need to convert it to integer to make use in for loop or any calculation.we can use:int(x), and this will convert x to int from string.Also, we have operators to change the variable values like =. +=, -=, /=, *= etc. So you need to remember these, and you will be up with all that is required for understanding variables. And rest is self explanatory certainly.
Explanation:
The answer is self explanatory
You are the administrator for a network with a single Active Directory domain called westsim. All computer accounts reside in organizational units (OUs) that correspond to departments. You have previously deployed a WSUS server in your location to specify the approved list of updates. All client computers are configured to download updates from your local WSUS server. You decide that you need to configure a separate update approval list for all computers in the Marketing department. You want the update list to be automatically identified based on the department membership for the computer. What should you do
"code is broken down by the computer until it is in _____and is a very long series of ons and offs
binary
code
decode
logic
Answer:
Binary
Explanation:
Binary is 0 and 1, true and false, on and off. It is the only language machines can understand.
Answer:
I'd say that the answer is Binary because it wouldn't be code, decode, or logic and Binary is the only one that makes sense and i got it correct when i did the exam.
Explanation:
What is the minimum base of the cloud layer to fly to the top of the towers 4 NM east of Onawa (K36)
Answer:
792 feet AGL.
Explanation:
Distributions of links in most networks follow a(n) __________ rule. radio_button_unchecked 60/40 radio_button_unchecked 90/10 radio_button_unchecked 50/50 radio_button_unchecked 80/20 SUBMIT
In most computer networks, the distribution of links follow an: 80/20 rule.
A network can be defined as a set of interconnected computer systems (nodes) and the relational ties linking the computer systems together.
An 80/20 rule is also referred to as the Pareto Principle and it can be defined as a concept in cybersecurity, which states that there exist an unequal relationship between outputs and inputs, in the ratio of 80 percent to 20 percent respectively.
In most computer networks, the distribution of links follow an 80/20 rule by rationalizing the amount of traffic that must enter into a network (20 percent) with respect to the amount of traffic that must exit the network (80 percent).
Read more: https://brainly.com/question/22365112