1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
3 years ago
9

Hello, can you help me answer these questions?

Computers and Technology
2 answers:
Anna35 [415]3 years ago
8 0

Answer:

Ans 1.To connect to the Internet and other computers on a network, a computer must have a NIC (network interface card) installed. A network cable plugged into the NIC on one end and plugged into a cable modem, DSL modem, router, or switch can allow a computer to access the Internet and connect to other computers.

Ans 2.Data travels across the internet in packets. Each packet can carry a maximum of 1,500 bytes. ... When you send an e-mail to someone, the message breaks up into packets that travel across the network. Different packets from the same message don't have to follow the same path.

Ans 3.protocol is a set of rules that governs the communications between computers on a network. A network protocol defines rules and conventions for communication between network devices.

Ans3 A protocol is a set of rules that governs the communications between computers on a network. A network protocol defines rules and conventions for communication between network devices.

Hope this fine

<h2>Pls Make me a brainlest </h2>
Len [333]3 years ago
7 0

Answer:

This is basically how searches are made

This is a pretty detailed answer which I wrote in my own words so.... you might not understand fully also you might not get all the answers here. BUT I HOPE IT HELPS!!

You might be interested in
To implement the various placement algorithms discussed for dynamic partitioning (see Section 7.2 ), a list of the free blocks o
STatiana [176]

Answer:

Check the explanation

Explanation:

Consider the following data

Let S represent the average number of segments

Let H represent the average number of holes

The probability that there is a hole immediately after the segment is 0,

So, when there are s segments in memory, there must be

s X 0.5 or \frac{s}{2}

Best-fit: this analyses the entire memory partitions available

a. you’ll have to selects the least one which is capable of handling the process exec.. Memo, space wastage .n be reduced In some cases, there will be no memory wastage

The average length a search is \frac{s}{2}

First-fit: This technique assigns Me the first hole that is big enough.

Searching Marts at the starting of Me set of holes.

The searching will be closed immediately a user gets a free hole that is big enough.

On an average it searches half of the set of holes.

The average length of search is Y2

\frac{s/2}{2} = \frac{s}{4}

5 0
3 years ago
If any one has mincraft on ps4 bedrock we can finish building a BIG city world all we need to put is a shop and money dispensers
sasho [114]

Answer:

Cool

Explanation:

7 0
3 years ago
Read 2 more answers
How can you ensure that your web pages are compliant with a w3c standard?
miss Akunina [59]
Use a code validation tool.
6 0
3 years ago
What acronym describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrig
vivado [14]
The acronym RFID (Radio Frequency Identification) describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrigerators, automobile components, light bulbs, and industrial control devices. RFIDs are  battery-powered sensors that gather and transmit data to a reading device. Some sensor based technologies are  scanning electron microscopes, LiDAR,radar, GPS, x-ray, sonar, infrared and seismic.



5 0
3 years ago
The ____________________ chip handles the functions of the keyboard controller.
RoseWind [281]
I think the ROM chip handles the functions of a keyboard controller.
7 0
3 years ago
Other questions:
  • In what sense are hardware and software equivalent
    6·1 answer
  • 1.
    12·1 answer
  • Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bits memory address r
    9·1 answer
  • "The ____________________ function is a logical function that returns a TRUE value if any of the logical conditions are true and
    14·1 answer
  • What is a technological advancement that is now being used in tractors throughout America?
    6·2 answers
  • What is the difference between KE an PE
    8·1 answer
  • If you have limited means, you...?
    9·1 answer
  • Activity 1.1.4 What is Technology?
    10·1 answer
  • What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
    9·1 answer
  • Greg is concerned about the use of ddos attack tools against his organization, so he purchased a mitigation service from his isp
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!