1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
8

All of the following are aspects of the search process except

Computers and Technology
1 answer:
pogonyaev3 years ago
5 0
<span>B. users vote on the relevance of the source, which affects whether it will appear in future searches. </span>
You might be interested in
Help me with this please​
Gnesinka [82]
Different types of connections are..

-A network is two or more devices connected through links.

-There are two possible types of connections: point-to-point and multipoint.

-A point-to-point connection provides a dedicated link between two devices.

Explain the different types of topologies

-Star network…
In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn't allow direct communication.

-Ring network…
A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to send some data to the last node in the ring topology

-Bus network…
In bus topology there is a main cable and all the devices are connected to this main cable through drop lines. There is a device called tap that connects the drop 

-tree topology…
Tree topologies have a root node, and all other nodes are connected which form a hierarchy. So it is also known as hierarchical topology. This topology integrates 

-Computer network…
Ring Topology; Star Topology; Mesh Topology; Tree Topology; Hybrid Topology; How to select a Network Topology? Types of Networking Topologies.

-Mesh networking…
Ring Topology; Star Topology; Mesh Topology; Tree Topology; Hybrid Topology; How to select a Network Topology? Types of Networking Topologies.

Different type of networks

-Computer network…
Virtual Private Network (VPN). By extending a private network across the Internet, a VPN lets its users send and receive data.

-LAN…
Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data. 3. Wireless Local Area Network (WLAN).

-Wide area network…
Wide area network, or WAN. In terms of purpose, many networks can be considered general purpose, which means they are used for everything from sending files etc.

-Metropolitan area network…
MAN or Metropolitan area Network covers a larger area than that of a LAN and smaller area as compared to WAN. It connects two or more computers that are apart.

-Wireless LAN…
WLAN (Wireless Local Area Network) helps you to link single or multiple devices using wireless communication within a limited area like home, school, or office 

-Wireless network…
A Wireless Local Area Network or WLAN is a network that is used to connect different devices without using wires etc.

-Storage area network…
Storage Area Network is a type of network which allows consolidated, block-level data storage. It is mainly used to make storage last longer etc.

-Personal area network…
PAN can be used for establishing communication among these personal devices for connecting to a digital network and the internet.

-Campus area network…
A Metropolitan Area Network or MAN is consisting of a computer network across an entire city, college campus, or a small region. This type of network is large.

Explain your own understand about protocol and standards

A protocol defines a set of rules used by two or more parties to interact between themselves. A standard is a formalized protocol accepted by most of the parties that implement it.

explain layers in OSI model

Physical, Data Link, Network, Transport, Session, Presentation, and Application.

Explain layers in tcp/ip model

Four layers of TCP/IP model are 1) Application Layer 2) Transport Layer 3) Internet Layer 4) Network Interface. ... It is also known as a network layer. Transport layer builds on the network layer in order to provide data transport from a process on a source system machine to a process on a destination system.

what are the peer to peer processing

In peer-to-peer (P2P) networking, a group of computers are linked together with equal permissions and responsibilities for processing data. Unlike traditional client-server networking, no devices in a P2P network are designated solely to serve or to receive data
5 0
3 years ago
What is web browser <br>​
xeze [42]
An application used to access and view websites
7 0
3 years ago
Read 2 more answers
Create a program that has at least three classes. The class with main. A class that defines a Name (first name, middle name, and
Bond [772]

Answer:

See attached file for complete detailed code.

Explanation:

See attached file.

Download txt
3 0
3 years ago
0 Select the correct answer. Which is an advantage of programming with a procedural language? A. Procedural program code is easy
Novosadov [1.4K]

Answer:

D. Algorithms of simple problems are readily available for reference. ​

Explanation:

Hope this helps you! Ask me anything if you have any quistions!

7 0
3 years ago
Which of the following statements is TRUE of business intelligence (BI) systems? Business intelligence systems are primarily use
Scrat [10]

Answer:

D) Business intelligence systems analyze an organization's past performance to make predictions is the correct answer.

Explanation:

  • Business intelligence systems represent systems that help the business in the decision making and strategic making method.
  • BI provides is applications that help in the analysis, collection, and integration of business information.
  • Business intelligence systems help the organization to analyze the business trends and to find the problems that occur in the business that is required to be examined.

5 0
3 years ago
Other questions:
  • When seeking information on the internet about a variety of subjects, the most useful place to look would be
    8·2 answers
  • If you delete a sent message on gmail does the person still get it
    14·1 answer
  • All resources are limited. Which of the following is NOT a resource?
    11·1 answer
  • What method is used to manage contention-based access on a wireless network?
    7·1 answer
  • An equation that performs a calculation is a formula. True or false quest
    9·1 answer
  • When power is completely removed from your computer
    11·1 answer
  • 1 punto
    11·1 answer
  • I found a brand-new charger wire still in its plastic package, but it's six years old and has never been used. Is it safe to use
    9·1 answer
  • Hiiiiiiiiihwdawdfgthnythgrfergthyjuhgfd
    12·2 answers
  • Mathematics and computer science share many concepts, such as recursion.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!