1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
3 years ago
14

To what would you compare the transport layer?

Computers and Technology
1 answer:
Paraphin [41]3 years ago
7 0
The answer is (B) The Post Office.

In layman’s terms, transport layer is similar to the post office functions of delivering parcel and letters and the agreed delivery deadlines. It also notices any dropped info and re-transmits it. Just like the post office, the transport layer directs messages and information between specific end users. If by mistake you write a letter to the wrong person, the letter will be returned and the postal employee will stamp it as address unknown.



You might be interested in
Complete the getNumOfCharacters() method, which returns the number of characters in the user's string. We encourage you to use a
photoshop1234 [79]

Answer:

The Java code is given below with appropriate comments

Explanation:

//Program

//Import the necessary libraries

import java.util.Scanner;

//Define the class

public class CountStringCharacters

{

//Start the main method

public static void main(String[] args)

{

//Prompt the user to enter the input line

Scanner scan = new Scanner(System.in);

System.out.println("Enter a sentence or phrase: ");

String s = scan.nextLine();

 

//Take the number of characters and keep the count

int numOfCharacters = getNumOfCharacters(s);

System.out.println("You entered: "+s);

System.out.println("Number of characters: "+numOfCharacters);

 

//Call the method outputWithoutWhitespace

outputWithoutWhitespace(s);

}

//The method getNumOfCharacters

public static int getNumOfCharacters(String s)

{

int numOfCharCount = 0;

for(int i=0; i<s.length();i++)

{

numOfCharCount++;

}

return numOfCharCount;

}

//Definition of the method outputWithoutspace

public static void outputWithoutWhitespace(String s)

{

String str = "";

for(int i=0; i<s.length();i++)

{

char ch = s.charAt(i);

if(ch != ' ' && ch != '\t')

str = str + ch;

}

System.out.println("String with no whitespace: "+str);

}

}

5 0
3 years ago
When saving a file, you must provide a valid file name that adheres to specific rules, referred to as _______________.
Naya [18.7K]

Answer:

a. file-naming conventions

Explanation:

File names need to follow certain criteria and constraints. Examples include:

  • File names must not start with special symbols.
  • File names can consist of letters,digits and special characters such as _.
  • File name can contain an extension after a dot sign.
  • File names must not be duplicates of an existing file.

Such constraints form part of file-naming conventions.

  • file-path represents the complete path to the file in the directory structure.
  • disk partition segments a hard disk into multiple volumes.
  • file-path starts from the root directory and spans one or more subdirectories to the location of the actual file.
6 0
3 years ago
How long would it take a 8 bit computer to calculate π to the thousandth place?
allochka39001 [22]
The average speed of an 8 bit computer is 0.50 MIPS or million instructions per second. There are three  thousand instructions per digit of the number in <span>π, the thousandth place needs 4 x 3 = 12 thousand instructions. The time it takes to do this is 12000 / (0.5 x 1000) = 24 seconds.

</span>
7 0
3 years ago
How does social media affect communication skills negatively?
AnnZ [28]
How social media affects communication negatively
The following are the ways in which social media affects communication negatively
1)Internet-the internet has made it easier to communicate too much use can result to addiction . Internet addiction make most of youths skip vital activities like homework,social activities among others. 
2)Text messages-The use of instant messaging has become popular especially among teens.Use of symbols such as emojis and abbreviated words has made many people to become too cusual on language use.
The use of fewer syllables and shorter words is likely to make teens leave out important aspects of verbal communication and may lead to misinterpretation of messages.
3)Dialogue-  Internet communication mostly takes place in the written form as opposed to the spoken form. Teens primarily communicate through textual posts,emails e.t.c all of which are in the written form.
Since written communication typically occurs in form of monologue, teens addicted to the internet may find it difficult to engage in dialogue a feature of verbal communication.For instance they may find it difficult to effectively use aspects of verbal communication such as tonal variation turn taking and speed.
<span>4)Informal language- </span>The use  of informal language is a salient feature of internet communication.This has a negative effect on teens mastery of formal language.
Internet language has features of informal language such as short turn taking, exclusion of auxiliary verbs and pronouns.
This could be due to the reason that teens put more emphasis on speed and efficiency at the expense of grammar.
5)Listening skills-
listening skills is an important aspect of verb communication and effective listening enhances communication.
Effective listening entails being information literate which is the ability to identify which information is needed when it is needed,where to find it, and effectively using it.
4 0
3 years ago
Decribe the components of an Microsoft<br>Windows desktop<br>​
damaskus [11]

Explanation:

the main component of Windows when you start your computer are the desktop, my computer, recycle bin , start button, Taskbar and shortcuts to application after opening an application you will also have a Windows with an active application which will appear in your desktop and taskbar.

3 0
3 years ago
Other questions:
  • What is an example of constructive criticism for an employee who is shy during meetings?
    15·2 answers
  • Writers should avoid jargon because jargon ______. a. Takes too long to use b. Limits what ideas can be explored c. Conveys too
    12·1 answer
  • Identify the computer cycle in each of the descriptions below by choosing the answer from the
    12·1 answer
  • Jackson is teaching a class the concept of the binary number system. Which term will he use to refer to the leftmost bit of a bi
    7·1 answer
  • Signs of mastery include?
    10·1 answer
  • What is the second stage of information processing cycle​
    10·2 answers
  • Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enou
    13·1 answer
  • You plan on using cost based pricing. The cost of your product is 10, and you are planning a 30% mark up. What should the price
    14·1 answer
  • when inserting a bibliography one choose from multiple ______ of bibliographies.[insert Bibliography]
    12·1 answer
  • What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!