1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
3 years ago
9

Ron travels extensively. He posts articles, photos, and videos about his experiences on a website. Which type of electronic comm

unity is he is using?
a.blog
b.message
c.newsgroup
d.social-networking site
Computers and Technology
1 answer:
Kryger [21]3 years ago
6 0
Ron would use a blog! So the answer is A !


HOPE I HELPED!!!!!!!!!!!


You might be interested in
What changes should be made in OSI model(Open System Interconnection).
saveliy_v [14]

Answer:

Explanation:

When most non-technical people hear the term “seven layers”, they either think of the popular Super Bowl bean dip or they mistakenly think about the seven layers of Hell, courtesy of Dante’s Inferno (there are nine). For IT professionals, the seven layers refer to the Open Systems Interconnection (OSI) model, a conceptual framework that describes the functions of a networking or telecommunication system.

The model uses layers to help give a visual description of what is going on with a particular networking system. This can help network managers narrow down problems (Is it a physical issue or something with the application?), as well as computer programmers (when developing an application, which other layers does it need to work with?). Tech vendors selling new products will often refer to the OSI model to help customers understand which layer their products work with or whether it works “across the stack”.

Layer 7 - Application

To further our bean dip analogy, the Application Layer is the one at the top--it’s what most users see. In the OSI model, this is the layer that is the “closest to the end user”. It receives information directly from users and displays incoming data it to the user. Oddly enough, applications themselves do not reside at the application layer. Instead the layer facilitates communication through lower layers in order to establish connections with applications at the other end. Web browsers (Google Chrome, Firefox, Safari, etc.) TelNet, and FTP, are examples of communications  that rely  on Layer 7.

Layer 6 - Presentation

The Presentation Layer represents the area that is independent of data representation at the application layer. In general, it represents the preparation or translation of application format to network format, or from network formatting to application format. In other words, the layer “presents” data for the application or the network. A good example of this is encryption and decryption of data for secure transmission - this happens at Layer 6.

4 0
3 years ago
Read 2 more answers
Bob works in a small office with a network of computers. Bob, along with all the other employees, is responsible for securing hi
miskamm [114]

Answer:

False

Explanation:

When an employee becomes the one responsible for the security of His own computer then the scenario does not define Network security. Network security is a usage of hardware and related software to provide protection to the underlying network architecture from unauthorized access and other anomalies related to networks.

5 0
3 years ago
Several of the items below indicate the steps required to move a slide to a different location in a presentation. Select those s
NikAS [45]
The answer should be
2
4
3
5
1
6
8 0
3 years ago
Read 2 more answers
The action displayed in the status bar while pointing-
Mrac [35]

Answer:

c

Explanation:

6 0
3 years ago
The router can deliver packets directly over interfaces 0 and 1 or it can forward packets to Routers R2, R3, or R4. Describe wha
ra1l [238]

Answer:

Following are the solution to this question:

Explanation:

In point A:

It applies the AND operation with the subnet-mask that is  

=128.96.39.00001010 \ \ AND \ \ 255.255.255.10000000 \\\\= 128.96.39.0000000 \\\\= 128.96.39.0 \\\

This corresponds to a 128.96.39.0 subnet. This is why the router sent the packet to 0.

In point B:  

It applies the AND operation with the subnet-mask that is 255.255.255.128

= 128.96.40.00001100\  AND \ 255.255.255.10000000 \\\\ = 128.96.40.0000000\\\\= 128.96.40.0

This suits the 128.96.40.0 subnet. The router then sent R2 to the packet. The packet.

In point C:  

It  applies the AND operation with the subnet-mask that is 255.255.255.128

=128.96.40.10010111 \ AND \ 255.255.255.10000000 \\\\= 128.96.40.1000000\\\\= 128.96.40.128

It  applies the AND operation with the subnet-mask  that is 255.255.255.192

= 128.96.40.10010111 \ AND \ 255.255.255.11000000 \\\\= 128.96.40.1000000 \\\\= 128.96.40.128\\

All of the matches of its sublinks above.  

Its default R4 router was therefore sent to the router by router.

In point D:

It  applies the AND operation with the subnet-mask  that is 255.255.255.192

= 192.4.153.00010001 \ AND \ 255.255.255.11000000\\\\ = 192.4.153.0000000 \\\\= 192.4.153.0 \\\\

It matches the 192.4.153.0 subnet. It router has sent packet to R3 then.

In point E:

It  applies the AND operation with the subnet-mask  that is 255.255.255.128

= 192.4.153.01011010\  AND \ 255.255.255.10000000 \\\\= 192.4.153.0000000 \\\\= 192.4.153.0

There, neither of the subnet inputs correlate with the ip address with the same subnet mask.

It  applies the AND operation with the subnet-mask  that is 255.255.255.192

=192.4.153.01011010\ AND \ 255.255.255.11000000 \\\\ = 192.4.153.0100000 \\\\= 192.4.153.64

It does not correlate to the subnet entries for same subnet mask, and therefore neither of the entries matches their corresponding ip address entries.  

Mask of the subnet.  That packet would therefore be sent to the default R4 router by the router.

4 0
3 years ago
Other questions:
  • Exposing employee and customer personal data to an untrusted environment is an example of:
    9·1 answer
  • Jake is photographing his pet puppy. He wants to preview the image the camera will capture. What part of the camera that is insi
    6·2 answers
  • Which devices are often used inside of tablets to store data on these devices?
    15·1 answer
  • The ___________ button represents the start of a hyperlink in Table of contents.
    7·1 answer
  • Can you guys help me plz <br> I want c++ code
    12·1 answer
  • All 24-point fonts take up the same amount of space on a slide. True False
    7·2 answers
  • Multiple Intelligence Theory explains that...
    8·2 answers
  • What single awk command can be used to display all the login names and their associated numerical user IDs
    14·1 answer
  • Please answer this question​
    8·1 answer
  • Data will zip through a 5G network much faster than through a 4G network because of the 10-fold difference in _____.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!