1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
3 years ago
5

What data does Bittorrenting uses? Explain.

Computers and Technology
1 answer:
amid [387]3 years ago
5 0

Answer:

A BitTorrent software consumer utilizes that data into the torrent data to communicate special tracker and support shifting of that data among networks including either complete or incomplete representations about the data-set.

Explanation:

BitTorrent is based at the thought of any torrent, which is a smallish data that includes metadata regarding a host, specific tracker, that organizes the data sharing and data that is distributed. A peer that wants to advance data available need first attain a tracker for the data, generate a torrent and later share the torrent data. Different peers can next use the information included in the torrent file support all other in downloading that data. That download is organized by that tracker.

You might be interested in
Technology is defined as human ________________ in action that involves the generation of knowledge and processes to develop sys
Alenkasestr [34]

Answer:

Innovation:

Explanation:

Technology is defined as human innovation in action that involves the generation of knowledge and processes to develop systems that solve problems and extend human capabilities.

To innovate is to make changes in something established, especially by introducing new methods, ideas, or products.

5 0
2 years ago
.Why are protocols important for networking?
NNADVOKAT [17]

Answer: Networking protocols are important as they define a set of rules to be used for exchanging information between computer nodes.

Explanation:

in terms of networking it is required for the source and the destination to have a set of predefined rules which enables the router to send and receive information across the network in such as way that both the ends are able to receive the messages.

The information exchange takes place first by the client by introducing itself to the remote server. the remote server upon receiving the information uses some form of handshaking and acknowledges the client of the receipt of the message.

besides this there are many routing protocols which tells us about the way how packets are sent from the client to the source. There are two types of routing protocols:

1. static routing protocols

2. dynamic routing protocols.

6 0
3 years ago
if ( (ans == 'Y' && errors < 5) || numTries < 10 ) // note uppercase 'Y' count++; Which combinations of values res
Shkiper50 [21]

The correction options to the case abode are:

Option B. ans = 'Y' (upper case)

errors = 6

numTries = 5

Option C. ans = 'y' (lower case)

errors = 4

numTries = 5

Option D. ans = 'Y' (upper case)

errors = 100

numTries = -1

<h3>What is Coding?</h3>

Computer coding is known to be the act that entails the use of computer programming languages to instruct the computers and machines on a given number of instructions on what need to be  performed.

Note that in the statement above,  the combinations of values results in count being incremented after the statement is complete is option B, C and D.

See full question below

Learn mode about coding from

brainly.com/question/22654163

#SPJ1

3 0
2 years ago
X³ + y³ + z³ = k
Kazeer [188]

Answer:  x³+y³+z³=42

- Z poważaniem

5 0
3 years ago
Read 2 more answers
Businesses or other organizations, including telephone, cable, and satellite companies that
USPshnik [31]

Answer:

Explanation:

Internet Service Providers (ISPs) these are organizations that provide internet access, we can categorize these companies like commercial, community-owned, non-profit, or otherwise privately owned, in addition, these companies must provide internet access and transit, domain name, web hosting, etc.

3 0
3 years ago
Other questions:
  • Does a soda vending machine Give reciepts?<br><br>need for computer science hw
    7·2 answers
  • How much does 1 American tank cost on gas for a regular mission? Depending on your answer, I will give you the right amount of p
    12·1 answer
  • Which of the following is the MOST likely cause of the connectivity issues?A user of the wireless network is unable to gain acce
    5·1 answer
  • Employees of Bodegas &amp; Bistros Inc. (2B) maintain a password-protected social media page to "vent about work." When 2B learn
    12·1 answer
  • You would like to know how many cells contain data. Which function should you use?
    11·1 answer
  • A certain computer can be equipped with 268,435,456 bytes of memory. Why would a manufacturer choose such a peculiar number inst
    12·1 answer
  • Type two statements.
    11·1 answer
  • While working on a customer issue, your colleague calls and asks for help to resolve his issue. What should you do?A. Go ahead a
    7·1 answer
  • A company was asked to develop a smartphone app to help people locate a car of their choice to purchase from a complex of more t
    7·2 answers
  • List and describe the 3 tasks learners can do in a Technology classroom.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!