The answer is Printer. hope this helped :)
Answer:
A. true
Explanation:
Based on the information provided within the question it can be said that the statement is completely true. This is because, traffic-monitoring applications have the main function of monitoring and analyzing the flow of traffic of one or various different items. Which can be applied to the business involving utility, infrastructure, and environmental services by monitoring the specific items regarding each business. Therefore making sure that enough product is entering or leaving each business as it is suppose to. As well as providing stock analysis and defective product alerts.
A data flow diagram is a graph that shows how data moves between internal operations and external entities as well as between data stores and activities within a system.
<h3>What does the movement of data between internal processes and data stores and external entities look like? </h3>
- A data flow diagram is a graph that shows how data moves between internal operations and external entities as well as between data stores and activities within a system.
- A data flow diagram (DFD) is a visual representation of how data moves between processes and data stores inside or outside of a system as well as between external entities.
- One of the deliverables for process modeling is context DFD.As seen on the DFD flow chart in Figure 5, a data flow diagram (DFD) is a graphical depiction of the "flow" of data through an information system, simulating various process elements.
- Information traveling through processes and data stores to reach the system is known as data flow.The DFD can show you the direction of the data flow with arrows and brief labels.
To learn more about data flow diagram refer
brainly.com/question/23569910
#SPJ4
Answer:
Explanation:
In data communications, a protocol is <em>connectionless </em>if it describes communication between two devices in a network without first establishing or verifying establishment of some link (connection) between the two devices. In a connectionless protocol, data are exchanged between processes or devices without a prior check of whether the processes are ready to transmit data or not. In this type of protocol, there's no verification put in place to remember if these processes were or are in communication. Connectionless protocols are also called stateless protocols. Because connectionless protocol cannot be relied upon due to its lack of delivery-assurance policy, it is sometimes referred to as <em>unreliable protocol</em>. In other words, delivery of data packets is not guaranteed. An example of a connectionless protocol is the UDP (User Datagram Protocol).
However, if the protocol defines some checks to ascertain that there is first a connection between two communicating processes before beginning transmission, then, the protocol is <em>connection-oriented. </em>An example of this is the TCP (Transmission Control Protocol). Connection-oriented protocols are reliable since they ensure connection be made between processes before transmitting data packets.
A typical application of a connectionless/unreliable protocol is in the streaming of real time videos or voice communication where packets of data could be dropped and not resent.
An example of the connection-oriented/reliable protocol is analogous to making a telephone call where data packets (voice messages) are not sent until the receiver on the other end makes a connection.