1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodka [1.7K]
2 years ago
10

The layer of ISO/OSI model organizes bits into logical data unit

Computers and Technology
1 answer:
max2010maxim [7]2 years ago
5 0

Answer:

Physical Layer

Explanation:

Physical Layer: It is responsible for the actual physical connection between

the devices. The physical layer contains information in the

form of bits.

You might be interested in
Which of the following is not a concern that has come out of the widespread adoption of the Internet?
slamgirl [31]

Answer:

The correct option is;

Selecting the correct browser to use for the sites you want to visit

Explanation:

Censorship of information is the subduing of information based on the consideration of such information being harmful or inconvenient

Increased anonymity

Making an individual anonymous which is one of the capabilities of the internet, is seen as encouraging unethical behavior and promoting discussions which are deemed uncivil in a commonly shared space online.

Unauthorized sharing of copyrighted information

The sharing and distribution of copyrighted material is against the law but it is a common occurrence and in various formats online

Out of the given options, selecting the correct browser to use for the sites you want to visit is the one that is not a concern.

5 0
3 years ago
Scientists measure an object’s mass in kilograms and its weight in newtons. If you knowthe amount of mass of an object in kilogr
Phoenix [80]

Answer:

public class WeightCalculator {

   

   private static DecimalFormat df2 = new DecimalFormat("#.##");

   

   public static void main(String args[]){

       //create scanner to receive user input

       Scanner in = new Scanner(System.in);

       //alert user to input mass

       System.out. println("Enter the Mass in Kg");

       //collect the input as a string

       String s = in. nextLine();

       //convert string to double and multiply by 9.8

       Double weight = Double.valueOf(s)* 9.8;

       

       //Print out answer formatted to 2 decimal place

       System.out. println("The Weight is " + df2.format(weight) + "N");

       

       //conditional statement to check if weight is less than 100

       if (weight < 100){

           System.out. println("Oops, it is too light");

       }

       //conditional statement to check if weight is more than 500

       if (weight > 500){

           System.out. println("Oops, it is too heavy");

       }            

   }

}

7 0
4 years ago
House real estate summary Sites like Zillow get input about house prices from a database and provide nice summaries for readers.
Ksivusya [100]

Answer:

current_price = int(input("Enter the current price: "))

last_months_price = int(input("Enter the last month's price: "))

print("This house is $" + str(current_price))

print("The change is $" + str(current_price - last_months_price) + " since last month")

print("The estimated monthly mortgage is ${:.2f}".format((current_price * 0.051) / 12))

Explanation:

Ask the user to enter the current price and last month's price

Print the current price

Print the change in the price, subtract the last month's price from the current price

Print the estimated monthly mortgage, use the given formula to calculate, in required format

6 0
4 years ago
The ____ category of apps makes the computer easier for blind people to use.
Schach [20]

The accessibility category of apps makes the computer easier for blind people to use. In general the accessibility apps are apps that help people with disabilities use a particular piece of hardware. For example there is an app designed to help blind people use their devices by paring them with a voluntary non-blind people trough audio-video connections.





4 0
3 years ago
One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
GaryK [48]

Answer:

Email Bomb

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the statement is False. The term being defined by the statement in the question is not called a mail spoof instead it is actually called an Email Bomb.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
4 years ago
Other questions:
  • The ________ model allows the owner of a resource to manage who can or cannot access the item. Owners maintain this access throu
    8·1 answer
  • How is steering different from turning ? Need help //:
    13·1 answer
  • How many bones are in a human body
    7·2 answers
  • When you receive five job offers what does it mean
    9·1 answer
  • ASAP ε=ε=ᕕ(°□°)ᕗ<br> Sorry if you can't see it but please help me if you can!
    6·1 answer
  • What are some ways you can work with templates? Check all that apply.
    9·2 answers
  • Create five circles like the Olympic Rings. fill them with the colors given below
    8·1 answer
  • Based on three scores that the user inputs, display the average of the score and the letter grade that is assigned fort he test
    5·1 answer
  • Which of the following statements is false? A. The internet has developed at a consistent rate throughout the world. B. There ar
    13·1 answer
  • Java Provide the command to call the calcCirArea() function using a value of 15 for the circle’s radius and storing the result
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!