1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vaselesa [24]
3 years ago
11

Explain the difference between an Internet draft and a proposed standard

Computers and Technology
2 answers:
lys-0071 [83]3 years ago
6 0
Here the third paragraph is some great explanation

Volgvan3 years ago
3 0

Answer: Explanation:

An Internet Draft often denoted with the acronym (I-D) is a six month valid series of document published by the Internet Engineering Task Force . It is a work-in-progress documents not intended for publication by RFC that contains preliminary technical specifications, results of networking-related research, and other technical information. Also, it can eventually be published as a Request for Comments (RFC) which might possibly lead to an Internet Standard.  Internet Draft does not have a formal status and this makes it subject to change or removal.

While

A proposed standard is a stable and resolved known design choices that is believed to be well-understood, has received significant community review, and, appears to enjoy enough community interest and this makes it valuable.

Proposed standards are of good quality and its implementations can be deployed in the Internet. However, proposed standards can be updated and improved if problems are noticed or better solutions are found because it should  have no known technical  omissions in its requirements, although this requirement can be waived by IESG when it is found useful.

Proposed standards deployed on the Internet are broadly used as stable protocols.

You might be interested in
This toolbar can be used to change the way the text in your presentation looks. Drawing
jenyasd209 [6]
Most likely formatting

6 0
3 years ago
Read 2 more answers
You would like to set up on online meeting to communicate with colleagues on a group project. Which of these tools should you su
Elenna [48]
WebEx :))))))))))))))))))))))
8 0
4 years ago
Read 2 more answers
While checking your work e-mail, you have received an e-mail warning you about a virus that is currently doing the rounds. What
choli [55]

Answer: D) Do an extensive web search to learn if it is a real virus.

Logical explanation: In the example, it is not a pop-up that you have a virus and instead an email that you have a virus. There is a very likely way that it could be a prank, scam, or a hacker.

Elimination explanation: If we look at all the answers:

A (Forward it to everyone in your address book) makes no sense, so A is eliminated.

Then with B (Forward it to your tech administrator) makes sense because if it was a real virus they may know what to do, but as my 'Logical explanation' explains, it may not be.

Finally with C, it's very irresponsible and should not be done. If it was a real virus there is a possibility it could be someone trying to steal information and more.

This leaves only option D left. :)

<h2><u>If this helped at all (or not), please remember to rate, thank, and mark brainliest as seen fit. Have a great day and stay safe! :)</u></h2>
4 0
3 years ago
Can someone help me with this question, i know all except psuedocode, help me please
Shkiper50 [21]

Answer:

what should I help you

Explanation:

I don't no any thing because I an beginning

7 0
3 years ago
How major is the technology problem in the United States?
babymother [125]

Answer:

The technology problems in the U.S are like

New security threats. Headline-grabbing recent events may spark surprising new security threats, says Rick Grinnell, founder and managing partner of Glasswing Ventures. ...

Data protection. ...

Skills gap. ...

Multi-cloud security. ...

Innovation and digital transformation. ...

Finding new revenue streams. ...

Lack of agility. ...

Outsourcing risks. danger

Explanation:

Hope this helped!!!

4 0
3 years ago
Other questions:
  • A list of the slides in a presentation is found here.
    7·2 answers
  • A prime number is a number that is only evenly divisble by itself and 1.
    12·1 answer
  • Which one of these tasks best describes the process of localization?
    12·1 answer
  • Effective character encoding requires:
    8·1 answer
  • What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
    15·1 answer
  • What does the term hardware refer to?
    13·1 answer
  • Sally needs to copy data from the first worksheet to the fifth worksheet in her workbook. Which combination of keys will she use
    11·2 answers
  • Why is it a good idea to defrag your hard disk regularly?
    9·1 answer
  • Which of the following are TRUE? A function can call another function. As long as the function is defined anywhere in your progr
    14·1 answer
  • Can some one please help
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!