1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elden [556K]
3 years ago
8

What i have to care about transmitting data packet from one controller to other controller?

Computers and Technology
1 answer:
Nata [24]3 years ago
3 0
You, nothing! The <span>Network is responsible of </span>transmission<span> of </span>data<span> from </span>one<span> device to </span>another<span> device</span><span>.</span>
You might be interested in
Given the list of customer segments below please create a new list of the names of the segments only using(a) a for loop(b) a li
Alchen [17]

Answer:

new_segment = [ ]

for segment in segments:

   new_segment.append({'name': segment, 'average_spend': money})

print( new_segment)

Using list comprehension:

new_segment =[{'name': segment, 'average_spend': money}  for segment in segments]

Using map():

def listing(a):

   contain =  {'name': segment, 'average_spend': money}

   return contain

new_segment = [ ]

new_segment.append(map( listing, segment))

print(list(new_segment)

Explanation:

The python codes above create a list of dictionaries in all instances using for loop, for loop in list comprehension and the map function which collect two arguments .

7 0
3 years ago
A game design company develops a game in which players run a grocery store and need to keep tabs on the dollar amount of goods s
sdas [7]
I do believe it is Inventory management but I can never tell if it is the right answer. so my regards if it the wrong answer.

6 0
3 years ago
What are three procedures used by browsers
ra1l [238]
I believe that the three procedures are...

1.  Sub - Standard sub routine

2.  Function - a routine that returns an answer

3.  Property - reserved for <span> Class Modules</span>

<span>Hope this helps, please mark brainliest!</span>

5 0
4 years ago
Read 2 more answers
A/An ________ attack in which a malicious hacker floods a Web server with millions of bogus service requests that so occupy the
CaHeK987 [17]

Answer:

denial of service

Explanation:

A <u>denial of service</u> attack in which a malicious hacker floods a Web server with millions of bogus service requests that so occupy the server that it cannot service legitimate requests.

6 0
3 years ago
Write all step for installing Dot Net in pc??​
Charra [1.4K]

Answer:

step 1 install app step 2 add any extension if needed step 3 open app and strp 4 get to work

8 0
3 years ago
Other questions:
  • Tricia listed her assets and liabilities. Credit Card Bill Car Loan Bonds Piano Bank Account Bicycle Which are Tricia’s liabilit
    8·2 answers
  • Levi's an experienced marketing strategist for a software company that sells a learning platform to public schools. He developed
    14·1 answer
  • Image below please help
    9·1 answer
  • Who is the last person appointed to the u.s supreme court
    11·1 answer
  • PLEASE PLEASE PLEASE HELP!! WILL GIVE A BRAINLIEST IF UR RIGHT!!
    14·1 answer
  • A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing e
    5·1 answer
  • Having a conversation with someone using a cellular phone is an example of _________ transmission. simplex full-duplex half-dupl
    11·1 answer
  • The most accurate readings that you can take on an analog VOM are when the meter's pointer is at the A. center scale. B. extreme
    11·1 answer
  • Given the availability of an ifstream object named input, write the other statements necessary to read an integer into a variabl
    6·1 answer
  • What is the accurate description
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!