1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vadim26 [7]
4 years ago
14

IM can only be sent to conacts who are currently

Computers and Technology
1 answer:
lesya692 [45]4 years ago
4 0

what is the question???

You might be interested in
On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control
Mila [183]

Answer:

c. traffic shaping

Explanation:

A traffic shaping system is one that allows to adapt the incoming data traffic that comes from some node of the network giving it a special treatment called conformation of accepted traffic and thus allowing the frames to be forwarded through the network of data under traffic rules without having gone through some traffic shaping method, this can be detected as non-conforming traffic at the edge of access to the discarded metropolitan network.

Traffic shaping is a mechanism that alters the traffic characteristics of the cell flow of a connection to achieve better network efficiency while maintaining QoS objectives or in order to ensure that the cell flow conforms to traffic parameters according to the leaky bucket algorithm configuration of the traffic contract. Traffic shaping can be used in ATM, for example, to reduce peak speed, limit the length of the burst by means of adequate spacing of cells over time. The use and location of this function is network specific.

5 0
3 years ago
What are the core components of a computer system?
Fantom [35]
CPU GPU harddrive ram
6 0
3 years ago
The ____ allows a core to communicate with other cpu components, such as the memory controller and other cores
Gnoma [55]
The appropriate response is Bus Interface Unit or BIU. The BIU gives different capacities, including era of the memory and I/O addresses for the exchange of information between outside the CPU, and the EU. 
The EU gets program direction codes and information from the BIU, executes these guidelines, and store the outcomes in the general registers. By passing the information back to the BIU, information can likewise be put away in a memory area or kept in touch with a yield gadget. Note that the EU has no association with the framework transports. It gets and yields every one of its information through the BIU.
4 0
4 years ago
1. You are creating a database for a web hosting service. Which of the following data types
Amiraneli [1.4K]
Well let me see what i can ansewrg x
4 0
3 years ago
Read 2 more answers
• Use variable to create the number 0 at location 0, 400.
pashok25 [27]

Answer: i thinks its

Explanation:

$('button')

 .html('Click me') // Try edit it...

 .on('click', () => console.log(''))

.on('click', () => console.log(''))

.on('click', () => console.log(''))

console.log('App started')

8 0
2 years ago
Other questions:
  • Anna always has a hard time finding files on her computer because she does not know where she saved them. This also affects her
    12·2 answers
  • The first step in the information processing cycle involves the _____ of data.
    10·1 answer
  • Friedman (1999) argues that "we are wrong to base health promotion in all societies on a Western framework for human development
    11·1 answer
  • What do character formats do for your document's message? A. Set how text aligns within a document B. Provide organization C. Pr
    6·2 answers
  • HW3_P1 - Student list using array
    7·1 answer
  • In an inspection, usually the first thing an inspector will want to see is:
    14·2 answers
  • In a penetration test, a ________ team consists of IT staff who defend against the penetration testers. They are generally aware
    14·1 answer
  • When do you use FTP?
    10·2 answers
  • What methods do phishing and spoofing scammers use? List and explain methods to protect against phishing and spoofing scams.
    14·1 answer
  • What other jobs would require employees to follow directions very carefully? (Give 4 examples)​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!