1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
4 years ago
8

A statement describing both the requirements that must be met by a product or process amd the ways in which satisfaction of the

requirements will be measured is called a/n
Computers and Technology
2 answers:
exis [7]4 years ago
8 0

Answer:

Requirement Specification

Explanation:

A statement describing both the requirements that must be met by a product/process and the ways in which satisfaction of the requirements will be measured is called an requirement specification.

Lelechka [254]4 years ago
5 0
I will rewrite your question and complete it.

A statement describing both the requirements that must be met by a product or process amd the ways in which satisfaction of the requirements will be measured is called a  ASTM test.

ASTM tests are given to check the requirements and standards on products or system.
You might be interested in
Type the correct answer in the box. Spell all words correctly.
Viktor [21]

Answer:

editor

Explanation:

I just took the test and got it right.

4 0
3 years ago
What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At which layer do the two
Mrrafil [7]

Answer:

  • Transmission Control Protocol is a Transport Layer protocol.  
  • This protocol is connection oriented which means that a connection is set up before the data packets are transmitted between the source and destination host which is a very reliable way of data transmission.
  • The connection is established between the source and the destination, after this the data is transmitted between them and lastly the connection is ended or terminated after the data transmission.
  • The packet or a messages that is delivered by TCP is called segment.
  • Basically TCP divides the data into small parts or chunks which are called segments.
  • The segment has a header and data section.
  • The segment header is further divided into the following parts.
  • Source port (sending port), destination port (receiving port), sequence number which is allocated to the first byte in the segment so that if the segments at the destination are sent out of order then it will help to rearrange these segments, Acknowledgement Number is number that the acknowledgement number sender expects to receive, header length, control flags which are used to control connection set up, connection termination and flow control, window size that a sender is ready to receive, Checksum field enables error control, Urgent pointer which is used to refer to data that is urgently needed to reach the receiving phase as soon as possible.  
  • User Datagram Protocol (UDP) is a Transport Layer protocol and a part of Internet Protocol suite.
  • This protocol is connection-less which means there  is no need to establish a connection between source host and destination host prior to the transmission of data which is an unreliable data transmission way.
  • The message in UDP is called datagram .
  • Unlike TCP segments there is no need to consider the order in which datagrams are sent or received.
  • Datagram has a header part which contains routing information a data section which shows the data to be transmitted.
  • Header has source port, destination port, checksum and length fields.
  • TCP and UDP protocols work in Transport Layer.
  • This layer is responsible for end to end delivery of data between source and destination hosts.
  • It ensures reliable data transmission and manages flow control and also ensures that packets reach in the right order in which they were sent.
5 0
3 years ago
Identify which component of a radiology service accounts for the use of equipment and supplies and the employment of radiologic
satela [25.4K]
The answer is Technical.
In Radiology, there are three main components – Professional, Technical, and Global. Among these components, technical is described as the service of the radiologic technologist. It’s also described as the use of equipment, film, and other supplies.
5 0
3 years ago
If you want to tune into a radio station that is carried by a signal with wavelength 3.0 meters, what channel would you choose?
Over [174]

Answer:  The radio should be tuned to 100. 0 Mhz.

Explanation:

As radio waves are electromagnetic waves, like x-rays, UV rays, and all the wavelengths of visible light, they propagate in the free space at the speed of light: 3. 10⁸ m/s.

At any wave, there is a fixed relationship between the distance travelled by the wave along one cycle (which is called wavelength ) and the speed at which the wave oscillates (which is called the frequency of the wave), with the speed at which the wave propagates, as follows:

λ (wavelength) =  v (speed) / f (frequency)

Replacing by the values, and solving for frequency, we have:

f = 3. 10⁸ m/seg / 3 m = 10⁸ 1/sec = 10⁸ Hz = 100. 0 Mhz

This is the radio channel to which must be tuned in order to listen the station with a wavelength of 3 m, in the FM band.

6 0
4 years ago
What makes a distributed denial of service attack "distributed"? It involves many ip addresses. It attacks multiple systems. It
makvit [3.9K]

Solution:

A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. The flood of incoming messages, connection requests or malformed packets to the target system forces it to slow down or even crash and shut down, thereby denying service to legitimate users or systems.

DDoS attacks have been carried out by diverse threat actors, ranging from individual criminal hackers to organized crime rings and government agencies. In certain situations, often ones related to poor coding, missing patches or generally unstable systems, even legitimate requests to target systems can result in DDoS-like results.

It works as:

In a typical DDoS attack, the assailant begins by exploiting a vulnerability in one computer system and making it the DDoS master. The attack master system identifies other vulnerable systems and gains control over them by either infecting the systems with malware or through bypassing the authentication controls (i.e., guessing the default password on a widely used system or device).

A computer or networked device under the control of an intruder is known as a zombie, or bot. The attacker creates what is called a command-and-control server to command the network of bots, also called a botnet. The person in control of a botnet is sometimes referred to as the bot master.

Botnets can be comprised of almost any number of bots; botnets with tens or hundreds of thousands of nodes have become increasingly common, and there may not be an upper limit to their size. Once the botnet is assembled, the attacker can use the traffic generated by the compromised devices to flood the target domain and knock it offline.


8 0
3 years ago
Other questions:
  • The internet has made worldwide access to networks and information simpler and faster. This access comes with both benefits and
    5·1 answer
  • What allows people to create their own radio shows over the internet?
    14·1 answer
  • When you move a paragraph in a document that includes text with a footnote, what happens to the footnote reference?
    7·2 answers
  • A very early version of a game that doesn't have all the parts is called
    14·1 answer
  • Does the brain play a role in smartphone addiction
    7·2 answers
  • True / False<br> An instruction’s opcode generally indicates the number and type of its operands.
    5·1 answer
  • How can you stay safe on the Internet? Check all that apply.
    8·2 answers
  • Treston, an automobile manufacturer, has recently implemented a new database system. It is confident that this system will help
    7·1 answer
  • Anyone on ps4 willing to trade me a fennec or McClaren on rocket league?
    6·2 answers
  • which server edition doesn't support any server roles that you would typically use with standard version
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!