1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katovenus [111]
3 years ago
5

why is wrong timing, poor technology, bad implementation and politics in business affected the OSI model as a standard

Computers and Technology
1 answer:
salantis [7]3 years ago
5 0

Answer:

In the academic environment, TCP / IP was much preferred because the OSI model was thought to be inferior to the TCP/IP model

Explanation:

The following show how business affected the OSI model as a standard:

WRONG TIMING

When OSI was made, TCP / IP was already in use. Also nobody wanted to be the first to start using OSI.

POOR TECHNOLOGY

Both the presentation and session layer that was dedicated in OSI was very little.

The technology used was very difficult to understand.

BAD IMPLEMENTATION

The initial implementation of OSI model was very slow and the OSI layer 7 model had bad quality.

POLITICS

In the academic environment, TCP / IP was much preferred because the OSI model was thought to be inferior to the TCP/IP model. They where rumors that the OSI was for the European and US government.

You might be interested in
the central processing unit(CPU)is responsible for processing all information from program run by your computer.​
olasank [31]

Answer:

This is a true statement.

Further Explanation:

The CPU is technically the brain of a computer, containing all the circuitry required to process input, store data, and output results.

3 0
3 years ago
Many who move to business-oriented information security were formerly__________ who were often involved in national security or
kirill [66]

Answer:

The information security function

Explanation:

Many who move to business-oriented information security were formerly_____ who were often involved in national security or cybersecurity . All of the above The information security function

5 0
2 years ago
When you compile your program, the compiler identifies the logic errors and suggests how to correct them?
Rainbow [258]
Nope. You're on your own to find them and fix them. This why testing is so important, otherwise they won't show up until the customer finds them and that's embarrasing.
6 0
3 years ago
You want to buy a new car, and you are thinking about two alternatives, car A and car B. You like both cars, and you are conside
hjlf

Answer:

Task 1: T = c + (2.5n(A/M))+ m(1+r/100)ⁿ

Task 2: In both 5 & 10 years, Car A is more economical

Task 3: Printing returns the answer in a different dialogue box while return displays the answer in the same window.

Explanation:

Task 1:

C = Cost of car

n = Number of years

m = Maintenance Cost

r = Rate

M = Mileage per gallon

A = Annual mileage

T= Total Cost

T = c + (2.5n(A/M))+ m(1+r/100)ⁿ

Task 2

Car A In 5 years; T = 20000+ (2.5*5(15000/25))+1300(1+0.15)⁵= $30115

Car B In 5 years; T = 30000+ (2.5*5(15000/32))+1000(1+0.10)⁵= $37470

Therefore in 5 years, Car A is more economical.

Car A In 10 years; T = 20000+ (2.5*10(15000/25))+1300(1+0.15)¹⁰= $40259.225

Car B In 10 years; T = 30000+ (2.5*10(15000/32))+1000(1+0.10)¹⁰= $ 44312.49

Therefore in 10 years, Car A is still economical.

Task 3: Printing returns the answer in a different dialogue box while return displays the answer in the same window.

4 0
3 years ago
What will be the value of input_value if the value 5 is input at run time?
Lunna [17]

Answer:

15

Explanation:

The if else state is used for checking the condition and if the condition is TRUE and program can execute the statement  within the if else.

Initially input_value is 5

then the if statement check the condition 5>5, condition FALSE because 5==5

it not less than 5.

then program move to else if and check condition 5>2, condition TRUE.

then, input_value = 5 + 10=15 execute and update the value to 15.

After that, program terminate the if else statement.

Therefore, the answer is 15.

5 0
3 years ago
Other questions:
  • Intuit, a tax and financial planning software company, creates a website where its QuickBooks customers can interact about probl
    6·1 answer
  • Revenue xls en excel
    8·1 answer
  • We will pass in 2 values, X and Y. You should calculate XY XY and output only the final result. You will probably know that XY X
    13·1 answer
  • When comparing alternative methods for making information systems identification and selection decisions, top management's selec
    7·1 answer
  • An arrangement in which local businesses team up with schools, hiring students to perform jobs that use knowledge and skills tau
    9·2 answers
  • A project manager type a document and print it he is using
    14·1 answer
  • Q. Which protocol would best serve to authorize users to access directory services?
    8·1 answer
  • ANYONE WANNA FRIEND ME ON DISCORD ゴRose joestarゴ#2088
    9·1 answer
  • Write the technical terms for the following statements: The repeated working capacity of computer.
    15·1 answer
  • What is the missing line of code? >>>from math th import >>> Point = [1,5) >>> bPoint [4.9]​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!