1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sunny_sXe [5.5K]
3 years ago
13

Contemporary operation of networking technology is possible only through the usage of open-use technology and layering approache

s such as the Open Systems Interconnection (OSI) Reference Model. True or false?
Computers and Technology
1 answer:
eimsori [14]3 years ago
8 0

Answer: TRUE

Explanation: Networking technology is the term used to describe the entire processes through which computer or mobile systems are linked up either through optic fibers,wireless systems in order to enhance effective communication across networks or regions.

OSI (open system interconnection), the earliest models partitions into seven layers and the OSI is known as model that creates partitioning a communication system classing them into abstraction layers.

You might be interested in
The program needs a Frisbee Golfer class.
gavmur [86]

Answer:

hwh1h1hj1j2j2

Explanation:

ebb2b2h2b2j1nn1b1

4 0
3 years ago
describe at least five ways in which information technology can help studying subjects other than computing​
Oksana_A [137]

Answer:

I'd that IT can help in a great many different fields like

Mathematics, in a manner of solving complex math equations

Statistics, in a manner of creating complex graphs with millions of points

Modeling, in a manner of creating models from scratch, either for cars, personal projects or characters for video games and entertainment

Advertising, in a manner of using IT to create not only the advertisements themselves but also, spreading that advertisement to millions in a single click

Music/Audio, in a manner of creating new sounds and music that wouldn't be able to work in any practical manner

Explanation:

4 0
3 years ago
The rotor in a shaded pole motor consists of
DedPeter [7]

The rotor in a shaded pole motor consists of a permanent magnet


I hope that's help:0

5 0
4 years ago
Beth accidentally clicked Send on a message that was addressed to multiple recipients. She wants to use the recall option. Which
yKpoI14uk [10]

Answer:

External users will be able to access the message.

Explanation:

When dealing with the internal email system of an enterprise, it's possible to do a recall on the message.  If someone on the internal list didn't open the message yet, it will simply be deleted from his queue and it will appear as is that email never existed.

For external users, once the email has been sent, it cannot be recalled... so they'll be able to access it no matter what, because that email exists on an external server on which you have no management control.

3 0
3 years ago
Leonardo is having difficulty accessing the course website. he should contact the for assistance. (points:1)
Alona [7]
He should contact the teacher for assistance
3 0
3 years ago
Other questions:
  • When troubleshooting firewalls, which of the following is not something you should do after you attempt a fix?
    7·1 answer
  • How does a 3D CAD solid model program display the progression of work involved in creating a model?
    5·1 answer
  • How can my computer catch a virus?
    13·1 answer
  • Write a program that finds the largest in a series of numbers entered by the user.The program must prompt the user to enter numb
    12·1 answer
  • If an individual column is listed in a SELECT clause, along with a group function, the column must also be included in a(n) ____
    12·1 answer
  • Which outcome is one of the negative consequences of anonymous communication over the Internet? It can lead to regulatory restri
    14·2 answers
  • If my usb could unlock my computer with a tool then could i be able to open it using ip unlock
    9·1 answer
  • How can having more than one goal cause truble in the work place
    6·1 answer
  • 2.3 pseudocode exercise on edhesive
    9·1 answer
  • What three actions happen when you cloak a folder or file?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!