Answer:
C: The protocols of the Internet are open and used by all devices connected to the network
Explanation: Hope this helps.
There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly. There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.
Answer:
Creation/application of technology to deliver goods/services with little human effort.
Explanation:
For example, manufacturing technology produces products without much need of human intervention.
Charles is having a lot of problems with errors in a very complicated spreadsheet that he inherited from a colleague, and he turns to another co-worker, Seymour, for tips on how to trace errors in the sheet. Seymour tells Charles that all error values begin with the same symbol, so they can be easily identified as errors.
The symbol is A)#.
Explanation:
- An error is something you have done which is considered to be incorrect or wrong, or which should not have been done.
- Generally errors are classified into three types: systematic errors, random errors and blunders
- Error values begin with the same symbol as they are easy to identify. Once an error is identified, it can be corrected.
- Error correction is the process of detecting errors in transmitted messages and reconstructing the original error-free data. Error correction ensures that corrected and error-free messages are obtained at the receiver side.
- Error Correction can be handled in two ways: Backward error correction: Once the error is discovered, the receiver requests the sender to retransmit the entire data unit. Forward error correction: In this case, the receiver uses the error-correcting code which automatically corrects the errors.
Answer:
gpresult
Explanation:
Group Policy provides the system administrator with settings that would be necessary to manage the different user accounts available in an organization. It also controls their work environment centrally by configuring the user Operating System (OS), applications and user accounts.
Group policy settings or configurations are referred to as Group Policy Objects (GPOs). These objects can be linked to organizational units (OUs), domains or sites.
There are various group policy commands such as;
- rstrui (System Restore tool will run),
- runas (using different permission to run a tool or program),
- tasklist (currently running programs are shown
- gpupdate (Group policies are refreshed)
- gpresult (group policy configurations are displayed for verification)
gpresult command can be used to verify the group policy configurations for adjustment or optimization. The technician can start troubleshooting from viewing the active settings, then running the rstrui to start the System Restore utility to restore the computer to an earlier date
The components of the enveloped virus budding process are:
- lipid bilayers
- fission event
- Glycosylated (trans-) membrane proteins.
<h3>What is the case of the virus about?</h3>
Virus budding in general is known to be a term that connote the scattering or disturbance of a cellular membrane and it is one away from the cytoplasm.
Note that it is said to be the envelopment of the viral capsid and this is done by one or more lipid bilayers that can be seen in the viral membrane glycoproteins, and it is one where a fission event takes place.
Hence The components of the enveloped virus budding process are:
- lipid bilayers
- fission event
- Glycosylated (trans-) membrane proteins.
Learn more about virus from
brainly.com/question/26128220
#SPJ1