1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
3 years ago
5

Why is the OSI reference model useful?

Computers and Technology
1 answer:
sveticcg [70]3 years ago
3 0
The answer to this question is B.

You might be interested in
Process is useful for a quick turnaround in game development?
aleksley [76]
Rapid prototyping as it allows the production of a functional program in a short time
7 0
3 years ago
Read 2 more answers
Find an example of a print or Internet ad that includes images and text, and then answer
WARRIOR [948]

4. Find an example of a print or Internet ad that includes images and text, and then answer the following questions about it.

           a. Describe the ad. (1-3 sentences. 1.0 points)

Mcdonald's all day breakfast. It shows their breakfast items, with high-quality images.

b. What do you think this ad's marketing message is? (1-5 sentences. 2.0 points) TIP: Does it use a specific desire or fear, or does it try to show how the product is a need or how it solves a problem?

They use desire because they show their delicious looking food, and the customers are wanting it.

c. Is the ad trying to get people to do something? If so, what is it trying to get people to do? If it isn't trying to get people to do something, what do you think the point of the ad is? (1-5 sentences. 2.0 points)

The ad is trying to get people to stop at Mcdonalds and buy their breakfast items

           d. Do you think this ad is effective? Why or why not? (1-5 sentences. 2.0 points)

Yes I think this ad is effective because it is showing high quality images of their breakfast items that encourage people to stop by and try their products.

3 0
3 years ago
Point out the wrong statement :
hoa [83]

Answer:

d. None of the mentioned

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

All of the following statements are true and correct because they are standard internet protocols;

I. Virtual appliances are becoming a very important standard cloud computing deployment object. This depicts the Platform as a Service (PaaS).

II. Cloud computing requires some standard protocols.

III. Cloud computing relies on a set of protocols needed to manage interprocess communications.

8 0
3 years ago
A wi-fi ______ is a wireless local area network that provides internet access to the public.
vovangra [49]
<span>WAN stands for Wide Area Network and represents an interconnected group of computers and peripherals that covers a large geographic area. 
</span>A public WiFi is a wireless local area network that provides internet access to the public. The public Wi-Fi<span> hotspots can be found in coffee shops, libraries, airports, hotels, universities..</span>
8 0
3 years ago
The length of a rectangle is 6cm and its perimeter is 20 cm . find its breadth​
Natali [406]

Answer:

4 cm

Explanation:

Width you mean?

The perimeter of a rectangle is 2*length+2*width, so

2*6+2w=20

12+2w=20

2w=8

w=4

The width is 4 cm.

5 0
3 years ago
Other questions:
  • While Angela is making modifications to Katie’s Word document, she would like to inform Katie of the reasoning for the change. W
    10·1 answer
  • The first widely adopted windows product, ____, featured a standardized look and feel, similar to the one made popular by apple'
    11·1 answer
  • What engine component is shown in the above Figure?
    14·2 answers
  • What is a specific naming convention important in regards to your file management system<br> ?
    7·1 answer
  • Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal
    9·1 answer
  • Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
    7·1 answer
  • Drag each label to the correct location. Each label can be used more than once. Match the device to the port through which it co
    15·1 answer
  • Any device that uses light to read and write information.
    9·2 answers
  • Information that's been collected to help solve a problem is called
    10·1 answer
  • How important are operating system in our devices?​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!