1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
3 years ago
11

Define the following concepts: computer network, network architecture, protocol, and multilayer protocol.

Computers and Technology
1 answer:
mr Goodwill [35]3 years ago
6 0

Answer:

 Computer network:

 The computer networking is basically defined as the set of various connected computer together in the system. It is basically connected various hardware devices together for the communication that facilitates the various file and resource sharing among the users.

There are many types of computer networking that are:

  • Bus topology
  • Ring topology
  • Star topology

Network architecture:

Network architecture can be characterized as the total structure of an association's PC arrange. Networking design it incorporates equipment segments utilized for correspondence, cabling and gadget types, organize format and topologies, physical and remote associations, actualized territories and feasible arrangements.

This design is constantly structured by a system supervisor/head with coordination of system specialists and other plan engineers.

Protocol:

 Protocol is the standard form of rules that basically allow the various electronic devices for communication. It is basically characterizes the  guidelines and shows for correspondence between system gadgets.

Conventions typically utilized for PC systems administration and all by and large use parcel changing strategies to send and get messages as bundles.

There are many types of the protocol that are:

  • UDP (User data-gram protocol)
  • TCP ( Transmission control protocol)
  • HTTP (Hypertext markup language)

Multi layer protocol:

 Multi layer protocol is the arrangement of the correspondence conventions give measures that enable various frameworks to speak with one another DNP3 is a lot of systems administration conventions structured explicitly for use in a class of frameworks known as supervisory control and information procurement, or SCADA framework.

You might be interested in
How can social media be used to find out about activities?
ICE Princess25 [194]
Hello RandomHacker


Using social media can inform you when events are happening near by. 

For example: Your favorite singer of band is going on tour and they are doing it near you, social media advertises this and you can find out in time to go.

Hope this helps
-Chris

3 0
3 years ago
Read 2 more answers
Batter boards (if properly offset) will allow for the end user to continually re-string the layout to double check accuracy with
natulia [17]

Answer:

The given statement is "True".

Explanation:

  • Batter panels seem to be platform frames that are used to temporarily suspend foundations plan threads. These same batter board members look like barriers once built.
  • Its positioning is important for creating a foundation precisely as the plans state since some components of their development would have to be accurate. Placed correctly batter panels guarantee that the boundaries seem to be at the appropriate temperatures as well as positions.
4 0
3 years ago
Discuss the various types of keys available on a computer keyboard.<br>No spam answer needs!❌❌​
olga nikolaevna [1]

Answer:• Alphanumeric keys – all of the letters and numbers on the keyboard. A-Z and 0-9.

• Punctuation keys – All of the keys associated with punctuation such as the comma,

period, semicolon, brackets, parenthesis and so on. Also, all of the mathematical

operators such as the plus sign, minus sign, and equal sign.

• Special keys – All of the other keys on the computer keyboard such as the function

keys, control keys, arrow keys, caps lock key, delete key, etc.

Special keys on a PC Keyboard

• Alt key – Short for Alternate, this key is like a second control key.

• Arrow Keys – Most keyboards have four arrow keys that enable you to move the

cursor (or insertion point) up, down, right, or left. Used in conjunction with the Shift

or Alt keys, the arrow keys can move the cursor more than one position at a time, but

this depends on which program is running.

• Backspace key – Deletes the character just to the left of the cursor (or insertion

point) and moves the cursor to that position.

• Caps Lock Key – A toggle key that, when activated, causes all alphabetic characters

to be uppercase.

• Ctrl key – Short for Control, this key is used in conjunction with other keys to

produce control characters. The meaning of each control character depends on which

program is running.

• Delete Key – Sometimes labeled Del, deletes the character at the current cursor

position, or the selected object, but does not move the cursor. For graphics-based

applications, the Delete key deleted the character to the right of the insertion point.

• Enter Key – Used to enter commands or to move the cursor to the beginning of the

next line. Sometimes labeled Return instead of Enter.

• Esc Key – Short for Escape, this key is used to send special codes to devices and to

exit (or escape) from programs and tasks.

• Function Keys – Special keys labeled F1 to F12. These keys have different meaning

depending on which program is running.

Explanation: use quillbot or wordtune to change the words

3 0
2 years ago
How do you use loops in code?
Keith_Richards [23]

Answer:

A loop in a computer program is an instruction that repeats until a specified condition is reached. In a loop structure, the loop asks a question. If the answer requires action, it is executed. ... A computer programmer who needs to use the same lines of code many times in a program can use a loop to save time

Explanation:

4 0
3 years ago
_______ refers to the poitically, religiously, or ideologically motivated use of computers (or related technology) by an individ
Anettt [7]

Answer:

The answer of the following blank is Cyberterrorism .

Explanation:

Cyberterrorism is the violent act by the use of an internet that results in the threat of any important files or the loss of life or the significance of the bodily harms, to achieve an ideological or political gains through the threat or the intimidation.

6 0
3 years ago
Other questions:
  • When u look at a green object through red glass the object will appear
    11·2 answers
  • A rich text format (RTF) provides an electronic image of a document and can be viewed, printed, and electronically transmitted.
    7·1 answer
  • Diane wants to maintain a record of percent change in sales from the year 2000 to the present year. She enters the values of per
    10·1 answer
  • What is the<br><br> stored program concept?
    8·1 answer
  • Analyze the following code:
    8·1 answer
  • Respecting yourself and others, educating yourself and connecting with others, and protecting yourself and others are all aspect
    11·1 answer
  • Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It
    13·1 answer
  • A security manager has discovered that sensitive information stored on a server has been compromised. The organization is requir
    7·1 answer
  • Draw any five (5) basic symbols used for flowcharting
    14·1 answer
  • 5 efectos del desarrollo tecnológico en el medio ambiente
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!