1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Simora [160]
2 years ago
7

Do you think that the TV set has outlived its utility as a household appliance? Research how convergence with internet technolog

y will change the role that television, radio, and film will play in the future. Write a short essay summarizing your findings.
Computers and Technology
1 answer:
kherson [118]2 years ago
7 0

Answer:

What is Computer? & technology

You might be interested in
Protocols used in each layers in each osi reference model
natka813 [3]

The protocols  that are often used in each layers in each OSI reference model are:

Layers                           Protocols

Layer 7- Application          SMTP, HTTP, FTP, POP3, SNMP

Layer 6- Presentation           MPEG, ASCH, SSL, TLS

Layer 5-Session                   NetBIOS, SAP

Layer 4-Transport                      TCP, UDP

Layer 3-Network                IPV5, IPV6, ICMP, IPSEC, ARP, MPLS.

Layer 2-Data Link       RAPA, PPP, Frame Relay, ATM, Fiber Cable.

Layer 1-Physical              RS232, 100BaseTX, ISDN, 11.

<h3>What is OSI Model?</h3>

The OSI Model is known to be a kind of a logical and conceptual framework that tells all about network communication that is often used by systems in an open to interconnection and also in any communication with other forms of systems.

Note that the Open System Interconnection (OSI Model) is one that tells more about a logical network and it is one that also tells about computer packet transfer via the use of various layers of protocols.

Therefore, The protocols  that are often used in each layers in each OSI reference model are:

Layers                           Protocols

Layer 7- Application          SMTP, HTTP, FTP, POP3, SNMP

Layer 6- Presentation            MPEG, ASCH, SSL, TLS

Layer 5-Session                   NetBIOS, SAP

Layer 4-Transport                      TCP, UDP

Layer 3-Network                IPV5, IPV6, ICMP, IPSEC, ARP, MPLS.

Layer 2-Data Link       RAPA, PPP, Frame Relay, ATM, Fiber Cable.

Layer 1-Physical              RS232, 100BaseTX, ISDN, 11.

Learn more about OSI reference model  from

brainly.com/question/12976859

#SPJ1

8 0
1 year ago
Ftp is a _________ that is utilized to copy and manage files over the internet
Marizza181 [45]
<span>Ftp is a network protocol that is utilized to copy and manage files over the internet.  </span>FTP<span> is widely </span>used<span> for transferring </span>files<span> between computers </span>over<span> a TCP/IP-based network, such as the </span>Internet<span>.</span>
5 0
3 years ago
What does it mean to reconcile an account?
Romashka-Z-Leto [24]

Answer:

It's to prove and/or document that the account balance shown in the internal files of the company is correct, using external data sources (like bank statements for example).

That way, you reconcile two versions of the reality to make sure you are telling the same story.

Once the account has been reconciled (usually by an external party), you can use it confidently in your decision making process or share it with other parties (like banks, governments, partners, and so on).

3 0
2 years ago
Ask what kind of pet the user has. If they enter cat, print "Too bad...", if they enter dog, print "Lucky you!" (You can change
nirvana33 [79]

Answer:

Explanation:

a = input("what kind of pet the user has")

if a == 'cat':

  print("Too bad")

elif a == 'dog':

   print("Lucky you!")

8 0
2 years ago
What is open addressing?
victus00 [196]

Answer:

Open addressing is the technique used in the hash tables  during the collision resolution. This method is also known as closed hashing.This techniques helps in the solving the issue of collision.

All the keys gets placed in the hash table and so the size of hash table equal to or greater number of overall keys.There are three techniques used for open addressing, which are linear probing ,quadratic probing and  double hashing

3 0
3 years ago
Other questions:
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
  • Which is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often dama
    14·1 answer
  • . _______ are the components that allow a posi-traction differential to transfer power from one drive wheel to another.
    10·1 answer
  • URGENT!!!
    13·2 answers
  • By default, windows does not display ____________________ in windows explorer.
    8·1 answer
  • How did mark watney survive the accident
    9·1 answer
  • What was the first Apple computer, and who was it designed by?
    7·2 answers
  • OSHA standards appear in the ___________ and are then broken down into ____________.
    9·1 answer
  • Can someone tell me how this is a SyntaxError! (Python3)
    12·1 answer
  • Supervisor: You will need to consolidate your trouble tickets
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!