1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorC [24]
3 years ago
12

____________________deals with syntax and semantics ofinformation exchange.

Computers and Technology
1 answer:
Goshia [24]3 years ago
3 0

Answer:

The answer is (a).Presentation Layer

Explanation:

This layer is located at the 6th level of the OSI model, responsible for delivering and formatting the information to the upper layer for further processing. This service is needed because different types of computer uses different data representation. The presentation layer handles issues related to data presentation and transport, including encryption,translation and compression.

You might be interested in
Deirdre has a hearing disability. One of her friends advised her to use real-time text or RTT on her phone. In which of these
ozzi

The way that real-time text or RTT on her phone can help her is that;

C: On phone calls, it will convert speech into text

<h3>Speech to Text</h3>

We are told that Deirdre has a hearing disability. This means that she has difficulty in hearing words clearly but can read.

Thus, from her friends advice about real time text or RTT, it will aid her because whenever someone calls her on the phone, it can convert the content of the call speech into text.

The missing options are;

A. It will make her phone vibrate to notify her when she gets a phone call

B. It will make her phone vibrate to notify her when she gets a text message.

C. On phone calls, it will convert speech into text. D. While text messaging, it will convert text into speech

Read more on speech to text at; brainly.com/question/2375490

5 0
2 years ago
____ is a technology that exists inside another device
Julli [10]

Answer:

Embedded technology is a technology that exists inside another device.

8 0
3 years ago
Read 2 more answers
Given the following code, what will be the value of finalAmount when it is displayed? public class Order { private int orderNum;
kkurt [141]

Answer:

522

Explanation:

5 0
3 years ago
This is Tim’s first job. He is not familiar with how the Internet is used at the workplace. Match the applications of Internet u
Gala2k [10]

Answer:

A - 2

B - 3

C - 5

D - 4

E - 1

Explanation:

A. Virtual private network : 2

This is very useful when you have to work from home or visiting a client and need access to files/applications just like if you were at the office.

B. Email :  3

Yes, this is basically why the Internet was created in the first place.

C. Social networking sites : 5

Social networks are indeed a great marketing tool, allowing to target potential customers very precisely.

D. Search engines :  4

Yes, to find information about new products for the company, how the competitors are doing and so on.

E. Video and web conferencing:  1

Another great tool for employees working from home for example, or for employees located in an office at the other side of the country.

4 0
3 years ago
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
Other questions:
  • This is a list of commands that tell your computer what to do. A icon B FAT C GUI D menu
    5·2 answers
  • Double clicking a word selects the entire word?
    10·1 answer
  • CNG and gasoline-powered vehicles use the same internal combustion engine, but different fuel types. A) True B) False
    8·2 answers
  • What is the top folder of the file tree called
    5·2 answers
  • Commands are organized into tabs on the
    8·2 answers
  • Analyze the following code. Number[] numberArray = new Integer[2]; numberArray[0] = new Double(1.5); Question 9 options: A) Sinc
    13·1 answer
  • 2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
    9·1 answer
  • The physical part or components of a computer system called​
    5·2 answers
  • Is it possible to have a deadlock involving only oneprocess? Explain your answer.
    11·1 answer
  • a machine needs a minimum of 100 sec to sort 1000 names by quicksort what is the approximate worst case time needed to sort 100
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!