1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
2 years ago
13

Laws differ from theories because laws do not provide

Computers and Technology
1 answer:
AveGali [126]2 years ago
7 0
Laws differ from theories because laws do not provide an explanation for how things work or could possibly work. A law describes what happens or needs to happen under certain conditions. A law can predict what will happen as long as those conditions are met. <span>For the purposes of this discussion, a "law" is a rule that has been formalised by repeated testing. It is also a generalisation. A theory, on the other hand, is an explanation for an observation that is supported by a large body of evidence. </span>
You might be interested in
Fill in the blank with the correct response.
Verizon [17]

Answer:

File structure.

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations of a web page to be displayed.

The file transfer protocol (FTP) client component of a full-featured HTML editor allows you to synchronize the entire file structure. Therefore, when you wish to share your entire html document over a network server such as a FTP client, you should use a full-featured HTML editor.

6 0
2 years ago
Program ___________________ are written explanations that are not part of the program logic but that serve as documentation for
Aleks04 [339]

Answer:

Program Comments

Explanation:

program comments are explanations. They are not executable code and the can actually appear anywhere in your code. Their main function is code documentation for the future. In Java programming language for example three types of comments is used. These are

// Single line comments  (This starts with two forward slashes

/* Multiple Line

comment

Style*/    

The third is the javadoc that gives a description of a function. I looks like the multiple line but is has two asterics

/** This is javadoc

comment

style*/

8 0
3 years ago
A network technician incorrectly wired switch connections in your organization's network. It effectively disabled the switch as
REY [17]

Answer:

The answer is D. Implement STP or RSTP.

Explanation:

STP (Spanning Tree Protocol) was built to serve as a remedy for network issues. Existing before switches were developed, it works as a substitute for a switch when a switch is wired incorrectly (as seen in the question) or when it fails. STP has two roles:

  1. To serve as an alternative when there is network failure or changes.
  2. To block out issues caused by loops on a network

RSTP (Rapid Spanning Tree Protocol) was built to optimize the standard STP. When there is a topology change, spanning tree convergence is much faster than the standard STP.

To prevent network failure in the future, STP or RSTP should be implemented.

5 0
2 years ago
How to convert ascii to hexadecimal?
Deffense [45]
ASCII is an agreement on which number represents which typographic character. Using this table you can look up the number of any character. For instance, "A" has 65, but that is a decimal. Next step is to represent this decimal number in hexadecimal. You can do that by taking the divisor and remainder of a division by 16. Numbers beyond 9 are represented as a through f. Hexadecimal numbers are commonly prefixed by "0x" to make them recognizable.

So "A" = 65 = 4*16+1 = 0x41

And "Z" = 90 = 5*16+10 = 0x5a

There are ASCII tables that have the hexadecimal value in them, to make the task easier (www.asciitable.com).

If you want to do this programmatically, you can write something like this (node.js):

console.log( Buffer.from('AZ', 'utf8').toString('hex'));

Note that the 0x prefix is not shown here.
7 0
3 years ago
50 POINTS!!!!! The managing director of a company sends a christmas greetings to all his employees through the company email. wh
seropon [69]

He uses an Enterprise International Private Network.

An Enterprise Internal Private Network is a type of network that is designed for private communication within an organization. The network could span multiple buildings using private communication lines.

Let me know if you have any questions.

6 0
2 years ago
Other questions:
  • Richman Investments is an investment and consulting firm. Richman wants to expand its business operations both in the U.S. and i
    14·1 answer
  • The Windows Group Policy feature provides __________ that govern the way Windows operates in enterprise environments. a. a centr
    8·1 answer
  • Casual or informal group meetings are common. Here youcasually chat over tea, meet after work, or get together for purelysocial
    5·1 answer
  • What is a recent technological breakthrough with an impact that can be compared to the invention of paper nearly 2,000 years ago
    8·1 answer
  • Which is a solution that represents the majority of VPNs on the market and is commonly referred to as a VPN appliance?
    13·1 answer
  • Advantages and disadvantages of internet
    11·2 answers
  • Which of the following is true of Chinese Opera: Two opera centers emerged Beijing and Yangzhou 300-400 forms of opera arose in
    10·1 answer
  • Assignment 4: Evens and Odds<br><br><br> How do I fix this?
    13·1 answer
  • Face book suggests Friends for users based on their
    13·1 answer
  • The layer of the ISO/OSI responsible for source to destination delivery.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!