1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kogti [31]
3 years ago
10

Describe the series of connections that would be made, equipment and protocol changes, if you connected your laptop to a wireles

s hotspot and opened your email program and sent an email to someone. Think of all the layers and the round trip the information will likely make.
Computers and Technology
1 answer:
Serggg [28]3 years ago
5 0

Answer:

Check Explanation.

Explanation:

Immediately there is a connection between your laptop and the wireless hotspot, data will be transferred via the Physical layer that will be used for encoding of the network and the modulation of the network and that layer is called the OSI MODEL.

Another Important layer is the APPLICATION LAYER in which its main aim and objectives is for support that is to say it is used in software supporting.

The next layer is the PRESENTATION LAYER which is used during the process of sending the e-mail. This layer is a very important layer because it helps to back up your data and it is also been used to make connections of sessions between servers of different computers

You might be interested in
Write a program to change background colour of your visual basic form with any 3 different events.​
Stels [109]

Answer:

To change the background color, select the form in Visual Studio and locate the BackColor property in the Properties panel. There are a number of ways to specify a color. Color by name - Simply type in a color name into the BackColor value field (for example Red, Yellow, Cyan etc).

Explanation:

4 0
2 years ago
Read 2 more answers
Which approach does procedural programming follow? bottom up, top down, random, or object oriented​
ELEN [110]

Answer:

Top to down approach

Explanation:

7 0
2 years ago
In a PERT network, non-critical activities that have little slack need to be monitored closely
kozerog [31]

Answer: b)because near-critical paths could become critical paths with small delays in these activities

Explanation: Program evaluation and review technique(PERT) technique is used for management of the project .The organizing, maintenance,coordination of any task is done by this chart. The non-critical activities need to be observed carefully because they may create near-critical methods which can lead to complexity.

Other options are incorrect because not all activities are equally rather monitoring is done to avoid errors and slack can occur at any path . Small delays can be caused but not complete project can get delayed and there can be risk of complexity rather than being uncompleted.Thus, the correct option is option(b).

6 0
3 years ago
Brake fluid is made up of a chemical that:
TEA [102]

A) IS MOSTLY JUST ENGINE Oil.

7 0
3 years ago
Read 2 more answers
2. A shift register can operate:
Naddik [55]
C. Both serially and Perullo
8 0
2 years ago
Other questions:
  • An effectively distributed resume will get an interview
    12·2 answers
  • To maintain audience interest in a multimedia presentation, use animations or transition features to control when objects or tex
    13·1 answer
  • For your biology class, you have taken a number of measurements for a plant growth experiment. You wish to create a chart that s
    7·2 answers
  • Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method
    8·1 answer
  • An audit trail is a record of how a transaction was handled from input through processing and output
    10·1 answer
  • colby lives a very career-driven lifestyle. he works long hours and enjoys making a lot of money by working overtime. after he a
    14·2 answers
  • The data-linking feature that allows Internet users to skip directly from a highlighted word to a related file in another comput
    12·2 answers
  • How do I get the most points, without any effort?
    11·2 answers
  • In 3-5 sentences describe to me in detail how you can make a change and better our online community. What are steps would you ta
    8·2 answers
  • What type of malicious software technology is used to download and install software without the user's interaction?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!