D. A window the rest are incorrect
The synonym for term port is seaport
Answer:
It is A: Packet metadata is used to route and reassemble information travelling through the internet.
Explanation:
Step 1: The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee
Step 2: Entering the network
Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee.
Step 3: Taking flight
The next hop delivers the packet to a long-haul provider, one of the airlines of cyberspace that quickly carrying data across the world.
Step 4: BGP
These providers use the Border Gateway Protocol to find a route across the many individual networks that together form the Internet.
Step 5: Finding a route
This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.
Step 6: Bad information
For the system to work properly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.
Last step: Arrival
The final hop takes a packet to the recipient, which reassembles all of the packets into a coherent message. A separate message goes back through the network confirming successful delivery.
CodeHS is an interactive online learning platform offering computer science and programming instruction for schools and individual learners.
CodeHS is focused on spreading access to and knowledge of computer science by offering online instructional materials supported by remote tutors.
Explanation:
Downloading an image from a website on the internet.
- Right-click the image.
- Choose the command Save Picture As. The command might be different in browsers other than Internet Explorer.
- Use the Save Picture dialog box to find a location to save the picture. You can rename the picture as it's saved to your computer's storage system
- Click the Save button.
Download an image of Karel the dog from the URL
- Create a folder in your laptop
- Place your text file of images URL in the folder.
- cd to that folder.
- Use wget -i images.txt.
- You will find all your downloaded files in the folder.
How your computer finds the CodeHS server, requests information from the server, and receives it.
- When you enter an URL into the address bar of browser, browser will send the domain to a server call DNS to convert the domain into IP address.
- For example: google dot com will be convert into 113.171.253.224
- Next, the browser will send your request to that IP.
- All your sent data will be divided into packages, each package contains your IP address.
- That is the reason why server know who it will send the response.
Answer:
(b). dependency and hedging.
Explanation:
In the management of risk, four common approaches for reducing risk are;
i. <em>Avoidance</em>: Especially if a risk involved in the management of a resource (or project) poses or presents a negative consequence, the best way to manage the risk simply avoid it by making sure it doesn't happen. This can be by cancelling a project or restructuring it.
ii. <em>Adaptation</em>: Another way of managing the risk associated with a resource (human or non-human resource) is to control the risk either by increasing resilience or reducing vulnerability. This is called adaptation.
iii. <em>Dependency: </em>This means accepting the risk since every project or business has inherently in it some risk associated. Dealing with it might be a way out especially knowing that there might be some experience to be gained in order to tackle similar situation in the future.
iv. <em>Hedging: </em>This means transferring the risk to some other business or organization. An example might be to get an insurance to manage this risk. In this case, the risk is transferred to the insurance company.