1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
3 years ago
9

Hello, can you help me answer these questions?

Computers and Technology
2 answers:
Anna35 [415]3 years ago
8 0

Answer:

Ans 1.To connect to the Internet and other computers on a network, a computer must have a NIC (network interface card) installed. A network cable plugged into the NIC on one end and plugged into a cable modem, DSL modem, router, or switch can allow a computer to access the Internet and connect to other computers.

Ans 2.Data travels across the internet in packets. Each packet can carry a maximum of 1,500 bytes. ... When you send an e-mail to someone, the message breaks up into packets that travel across the network. Different packets from the same message don't have to follow the same path.

Ans 3.protocol is a set of rules that governs the communications between computers on a network. A network protocol defines rules and conventions for communication between network devices.

Ans3 A protocol is a set of rules that governs the communications between computers on a network. A network protocol defines rules and conventions for communication between network devices.

Hope this fine

<h2>Pls Make me a brainlest </h2>
Len [333]3 years ago
7 0

Answer:

This is basically how searches are made

This is a pretty detailed answer which I wrote in my own words so.... you might not understand fully also you might not get all the answers here. BUT I HOPE IT HELPS!!

You might be interested in
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as:
icang [17]
~Hello there! ^_^

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as..?

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as botnets.

Hope this helps~





3 0
3 years ago
Which of these field types allows multiple, non-exclusive options?
AlexFokin [52]

Question:

Which of these field types allows multiple, non-exclusive options?

A. multi-part

B. checkbox

C. text

D. radio button

E. button

Answer:

The correct option is B) Checkboxes

Explanation:

Field types is a terminology often associated with Database Management.

A field type is often found in a data collection apparatus such a form. It's inherent quality or nature will determine the kind of data that it can collect.

Some field types allow for exclusive options. That is, in some data field types, it's impossible to select more than one option.

For example, a Button field type can only collect one type of value.

A Checkbox on the other can be configured to allow for multiple selections which may or may not be exclusive.

When working with Microsoft Access, for instance, you are required to select the name of the <em>field </em>and define the type of <em>field data.</em>

<em />

Cheers!

6 0
2 years ago
How does a hard drive work
hammer [34]
Hi There!

<span>How does a hard drive work?

Hard Drive is for saving information </span>
7 0
3 years ago
Suppose you create a class Square to be a subclass of GeometricObject. Analyze the following code:
Lemur [1.5K]

Answer:

B. The program has a compile error because you attempted to invoke the GeometricObject class's constructor illegally.

Explanation:

To call a superclass constructor, the user must use super(). This is necessary unless default constructors are used. Also, it is vital to make sure if their are appropriate argument to be used while invoking the superclass constructor.

3 0
3 years ago
Complete the divisible_by(list1, int1) function below. As input, it takes a list of integers list1 and an integer int1. It shoul
damaskus [11]

Answer:

The function is as follows:

def divisible_by(listi, n):

   mylist = []

   for i in listi:

       if i%n == 0:

           mylist.append(i)

   return mylist

   pass

Explanation:

This defines the function

def divisible_by(listi, n):

This creates an empty list

   mylist = []

This iterates through the list

   for i in listi:

This checks if the elements of the list is divisible by n

       if i%n == 0:

If yes, the number is appended to the list

           mylist.append(i)

This returns the list

   return mylist

   pass

5 0
2 years ago
Other questions:
  • At an open or uncontrolled intersection, yield if ____.
    15·2 answers
  • Plz answer me will mark as brainliest ​
    10·2 answers
  • You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the
    15·1 answer
  • Which of the following are not parts of a message? Select all that apply.
    12·1 answer
  • During detachment, _____.
    12·2 answers
  • Unemployment can be viewed as
    14·1 answer
  • Describe how spacecraft evolved from the US Mercury to contemporary space shuttles.
    10·1 answer
  • MoonieStardust Here is the rest of the picture from my last question you answered.
    11·2 answers
  • Write a function that dynamically allocates an array of integers. The function should accept an integer argument indicating the
    8·1 answer
  • How to get the lightning round in dares of eternity
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!