1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina [24]
3 years ago
12

What is a segment

Computers and Technology
1 answer:
monitta3 years ago
3 0
A length of uninterrupted cable connecting two devices
You might be interested in
During the processing stage what does the computer do
Ann [662]
<span>The finished product is "output." In the electronic computer, data are the raw material or input to the computer.</span>
5 0
3 years ago
What is true about super computers?
lorasvet [3.4K]

Explanation:

Super Computer are expensive computer that are used to provide very quick results. Super computer are used in calculating complex mathematical calculations. Calculations such as weather forecast and Atomic energy research. Therefore Super Computer perform complex calculations rapidly.

5 0
3 years ago
In Python, the data structure that stores elements of the same data type is called an array.
Serhud [2]

Answer:

Yes

Explanation:

An array is a homogeneous data structure (elements have same data type) that stores a sequence of consecutively numbered objects--allocated in contiguous memory. Each object of the array can be accessed by using its number (i.e., index). When you declare an array, you set its size.

3 0
3 years ago
Borrowing other images and videos are allowed as long as ________?​
My name is Ann [436]

Answer:

as long as there appropriate

6 0
2 years ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Other questions:
  • In this assignment, you are going to add conditional formatting to the spreadsheet you used in the previous
    13·1 answer
  • A power supply unit for a computer converts:
    7·1 answer
  • Although highly accurate navigational information from the GPS constellation is exploitable by adversary forces, it is unlikely
    5·1 answer
  • How can you create the first row of the table as the header of the table?
    14·2 answers
  • Which of the following is a true statement?
    12·2 answers
  • Write a function that takes an integer value and returns the number with its digits reversed. for example, given the number 7631
    10·1 answer
  • What is computer assisted translation​
    9·1 answer
  • You looked at the methods used to determine database requirements. Now, research and find a database requirements template. Choo
    9·1 answer
  • Think of some local businesses that have websites. Look online and identify two different websites for businesses or services in
    14·1 answer
  • The ______ engine compares your entry against its database and returns a list of hits or sites that contain the keywords. (hint:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!