1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sunny_sXe [5.5K]
3 years ago
13

Contemporary operation of networking technology is possible only through the usage of open-use technology and layering approache

s such as the Open Systems Interconnection (OSI) Reference Model. True or false?
Computers and Technology
1 answer:
eimsori [14]3 years ago
8 0

Answer: TRUE

Explanation: Networking technology is the term used to describe the entire processes through which computer or mobile systems are linked up either through optic fibers,wireless systems in order to enhance effective communication across networks or regions.

OSI (open system interconnection), the earliest models partitions into seven layers and the OSI is known as model that creates partitioning a communication system classing them into abstraction layers.

You might be interested in
Computers help eliminate the repetitiveness of manual task how can this benefit you in your overall career?
rjkz [21]

Answer:

Explanation:

When I went to high school, our next door neighbor had a pet dinosaur. We used to have to do math problems that were incredibly long and tedious. Things like the gas laws. They involve 5 numbers with 2 decimal places and we were asked to find the 6th number.

Eventually we were taught to use log tables but by then we were too numb to care.

Computers however take repetitiveness in their stride. They don't gag at how many times they have to repeat an operation. They don't mind if they do it a thousand times or a million or 100 million times. Some algorithms like the Monte Carlo method depend on trying an operation a million times. Humans would go crazy if they had to do that. Computers can do simple algorithms a million times while the mouse is on the go command.

If you pick a job like a tax consultant, you will be glad not to do any more than knowing where the numbers that make up your data go.

Same with banks and insurance jobs. I'll bet there are many jobs in medicine that require repetitive calculations.

7 0
3 years ago
When a user attempts to visit an internet-based web server, what is the default action of the windows firewall?
Kamila [148]
Google chrome and internet explore
7 0
3 years ago
WHAT DO YOU KNOW?<br> Why would you want to change your Table<br> Properties?
joja [24]

read the slides ;  Table Properties are the way the table appears or looks.

6 0
3 years ago
5. Question<br> Which one of these can connect directly to the Internet?
I am Lyosha [343]

Answer: Clients

Explanation:

A Client refers to a computer that is able to connect to a server usually in a network in order to access the services provided by that server.

When a user tries to access the internet, the Client accesses the relevant server and requests the information that the user is requesting. The server then sends this to the client which then formats it in the way that the user can understand. The client is thus the direct connection to the internet.

7 0
3 years ago
What is a blog . explain with example clearly .​
const2013 [10]

Answer:

A blog (a truncation of "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order, so that the most recent post appears first, at the top of the web page.

Explanation:

3 0
3 years ago
Other questions:
  • Which is the most efficient way to italicize a row of text in every worksheet in a workbook?
    8·1 answer
  • Which image shows organic shapes? <br> A. image 1 <br> B. image 2 <br> C. image 3 <br> D. image 4
    14·2 answers
  • Your company has merged with another company that also uses Windows Server 2016 and Active Directory. You want to give the other
    6·1 answer
  • A personal identification number (PIN) that opens a certain lock consists of a sequence of 3 different digits from 0 through 9,
    7·1 answer
  • What are the advantages of using the internet as theinfrastructure for electronic commerce and electronicbusiness?
    6·1 answer
  • A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
    8·1 answer
  • Currently, this program will add 6 and 3 together, output the math problem and output the answer. Edit this code so that a rando
    9·1 answer
  • HELP PLX ITS PYTHON BTW!!!
    8·1 answer
  • Write a 5 – 7+ sentence paragraph about Thanksgiving that DOES NOT use the letter “t.”
    10·1 answer
  • Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authe
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!