1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semenov [28]
3 years ago
8

Which one of the statements is false

Computers and Technology
1 answer:
Ostrovityanka [42]3 years ago
4 0

Answer:

The answer would be 2 I think

Explanation:

You might be interested in
Megan says she never needs to look at the Transport Layer when she is searching for what went wrong with the network she support
lara31 [8.8K]

I'd say D: Wrong, because transporting information is what a network does, and the Transport Layer is at the heart of that layer.

Transport layer is truly at the heart of the OSI model. Its main function is to transfer application data from the source to destination. This layer provides a reliable end-to-end communication service and transfers data for the user layers above it, as well as shielding the rest of the layers below from details like message error and flow control functions. If packets get destroyed or lost during transmission, it is in the best interest of Megan to check the transport layer. Transport layer ensures that whenever something like this happens, packets must be re-transmitted.

3 0
3 years ago
Read 2 more answers
__________ is a single set of hardware, databases, networks, people, and procedures configured to collect, manipulate, store, an
sergiy2304 [10]

Answer:

Computer-based Information System

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the term being described is called a Computer-based Information System (CBIS). This is (like mentioned in the question) a data processing system into a high-quality information and can be used to support decision-making, coordination and control as well as visualizing and analyzing data.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
4 years ago
3. Why did Steve Jobs and Steve Wozniak start working on developing computers?
LenaWriter [7]
Jobs was less hands-on when it came to developing computer software, and instead focused on design, advertising and talking to press, Wozniak said. “One thing he wanted was to somehow be important in the world, though he didn't have the academic or business, background, he had me,” he said.
4 0
4 years ago
_________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
sergij07 [2.7K]

Answer:

DOS, Denail of Service Attacks

Explanation:

5 0
2 years ago
In ipv4 addressing, an ip address whose first octet is in the range of 192–223 belongs to a class ____ network.
pishuonlain [190]

I guess the correct answer is class C network.

In IPv4 addressing, an IP address whose first octet is in the range of 192–223 belongs to a class C network.

4 0
3 years ago
Other questions:
  • What is the portrait mode?
    5·2 answers
  • Pls go to my account and answer my question
    11·2 answers
  • Explain about RDBMS. Include advantages/ disadvantages. Compare DBMS vs RDBMS. Explain about Oracle as well.
    14·2 answers
  • Name three actions you can perform on an inserted image.
    7·2 answers
  • What is the root of the tree?
    6·1 answer
  • As of MySQL 5.5, which of the following is the default table storage engine?
    14·1 answer
  • Write a C program that will load entries from a file containing details of books and prints them.
    14·1 answer
  • How does design influence the product's function?
    5·1 answer
  • What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
    13·2 answers
  • ফাইল ও ফোল্ডারের মধ্যে পার্থক্য কি এবং ৫ টি ইনপুট ডিভাইসের নাম কি​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!