1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nika2105 [10]
3 years ago
11

JOIN ZOOM Code- 858 1417 3090 Password- XvT18Q

Computers and Technology
2 answers:
LuckyWell [14K]3 years ago
7 0

Answer:

can yall help me please i need help with my work and no one helped me there are some questions on my page that need to be answer i will give brainliest

Explanation:

lutik1710 [3]3 years ago
6 0

Ion think that’s how it works bruv-

You might be interested in
This type of software works with end users, application software, and computer hardware to handle the majority of technical deta
Lena [83]
System software will be the answer
3 0
4 years ago
Range is an example of a ______________.
k0ka [10]

Answer:

example in ( 4,6,9,3,7) lowest value is 3and highest is 9.

4 0
4 years ago
The IP protocol (and UDP) are called "connectionless" and "unreliable." Describe what those two words mean in the context of dat
igor_vitrenko [27]

Answer:

Explanation:

In data communications, a protocol is <em>connectionless </em>if it describes communication between two devices in a network without first establishing or verifying establishment of some link (connection) between the two devices. In a connectionless protocol, data are exchanged between processes or devices without a prior check of whether the processes are ready to transmit data or not. In this type of protocol, there's no verification put in place to remember if these processes were or are in communication. Connectionless protocols are also called stateless protocols. Because connectionless protocol cannot be relied upon due to its lack of delivery-assurance policy, it is sometimes referred to as <em>unreliable protocol</em>. In other words, delivery of data packets is not guaranteed. An example of a connectionless protocol is the UDP (User Datagram Protocol).

However, if the protocol defines some checks to ascertain that there is first a connection between two communicating processes before beginning transmission, then, the protocol is <em>connection-oriented. </em>An example of this is the TCP (Transmission Control Protocol). Connection-oriented protocols are reliable since they ensure connection be made between processes before transmitting data packets.

A typical application of a connectionless/unreliable protocol is in the streaming of real time videos or voice communication where packets of data could be dropped and not resent.

An example of the connection-oriented/reliable protocol is analogous to making a telephone call where data packets (voice messages) are not sent until the receiver on the other end makes a connection.

6 0
3 years ago
Federal law requires safety training before workers or students enter the work area.
otez555 [7]

It is True.

According to federal laws in the U.S, an employer is required by law to provide training to all employees. The employees should acquire this knowledge and understanding and any skills necessary for the performance of the duties. The employer is also required to certify that the training has been accomplished.


8 0
4 years ago
What is 1/10 of 2.0 in decimal form​
son4ous [18]

Answer to this is .2

5 0
4 years ago
Other questions:
  • William is an amateur photographer who plans to create a portfolio to improve his career prospects. He wants to capture a mother
    6·1 answer
  • The default primary key for an access database is the id field true or falser
    7·1 answer
  • Nina is explaining the SQA process to her friend Amanda.
    9·1 answer
  • Is using abbreviations and symbols in social media a problem? Why or why not?
    11·1 answer
  • Mass Media does not play a large role in American society. Please select the best answer from the choices provided
    13·2 answers
  • Assume that the vector arr has been declared. In addition, assume that VECTOR_SIZE has been defined to be an integer that equals
    10·1 answer
  • What method of research deals with large amounts of information that is analyzed and presented statistically?
    9·1 answer
  • Why do software managers have to be generalists with a range of skills, rather than simply technical specialists?
    14·1 answer
  • Which benefit does the cloud provide to star-up companies without access to large funding?
    11·1 answer
  • Express 42 as a product  of its prime factor​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!