1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
12

The set of rules for how computers talk to one another is called

Computers and Technology
1 answer:
lianna [129]3 years ago
6 0
Protocol. Like TCP/IP or HTTP etc
You might be interested in
What is a traffic controller?what are its functions?
olchik [2.2K]

Answer:

A traffic controller is basically a system design to regulate traffic in a controlled manner with a set of traffic rules to follow so as to ensure public safety .

The main functions of a traffic light controller are listed below:

  • To direct  and regulate vehicular and pedestrian traffic
  • To ensure safety of construction workers, emergency response team and public in general in order to avoid accidents
  • These also uses CCTV and other monitoring system to manage flow of traffic and suggestion concerned with traffic congestion. These are provided by local or state authorities.
  • To ensure smooth traffic flow in order to save time and chaos.

4 0
3 years ago
Why did the i have a dream speech happen
lions [1.4K]
Because he wanted equal rights for everyone
7 0
3 years ago
When choosing a new computer to buy, you need to be aware of what operating it uses.
Pavlova-9 [17]

Answer: Size & Form-Factor, Screen Quality,Keyboard quality,CPU, RAM, Storage,Battery Life, USB 3.0, Biometric Security,Build quality.

Explanation:

1 - 7 are the most important for laptops and for desktops 1,3,4,5and 6.

Hope this helped!

8 0
3 years ago
My home PC has IP address 192.168.1.22 and connects to the Internet through a NAT router. Assume I am downloading a web page fro
alekssr [168]

Answer and Explanation:

There are three sections to the inquiry.  

1. what occurs inside the PC or host when a bundle is produced by an application.  

2.how it goes from one host that is a source to another host that is a goal with numerous switches sitting in the middle.  

3.what goes inside goal have when it gets a parcel on the system.  

how about we examine individually  

Handling bundle at source machine:  

The application creates a bundle to be sent on the system and sends it to the layer beneath.  

The following layer is known as a vehicle layer which oversees start to finish correspondence between two machines. The convention utilized can be TCP or UDP. What is the contrast between these two conventions is another subject by and large.  

When the parcel is framed at the vehicle layer, it is sent to the system layer which includes source and goal IP in the bundle. A most significant field which is included at IP or system layer is Time To Live (TTL) which is utilized by middle switches/changes to choose if a parcel should be sent or not. (How goal IP is found?)  

After the system layer, the parcel arrives at the information connection or MAC layer, where the source and goal MAC address of machines are included. We will perceive how these fields change between each two neighbors. (How goal MAC is found?)  

The information interface layer pushes this bundle to the physical layer where it is sent as a flood of "0" and "1" on the physical medium accessible.  

Preparing a bundle at switch:  

Steering  

There are three cases which may happen when the switch investigates the directing table for goal IP  

1. On the off chance that there is a section relating to goal IP, we get the interface name the parcel ought to be sent to.  

2. On the off chance that there is no immediate passage, at that point IP is changed over into organize IP utilizing the veil and afterward checked once more. It ought to be noticed that the longest prefix match to locate the best sending interface.  

3. In the case of nothing matches, at that point the switch just advances it to the default goal designed.  

Sending  

Epitome  

Preparing parcel at the goal have  

The parcel is gotten at arrange card, physical layer, which produces a hinder to CPU and CPU peruses bundle in,  

At the information connect layer, goal MAC address is verified whether the parcel is bound to this machine, If indeed, the bundle is sent up to the system layer.  

At the IP layer, parcel approval like checksum confirmation, and so on is done and afterward gave to the applicable vehicle layer.  

Transport later at that point gives it to the fitting port with the goal that it arrives at the right application.

5 0
3 years ago
The members of the IT department have spent two days debating the best approach to roll out the new software update. After allow
devlian [24]

Answer:

<em>Functional conflict</em>

Explanation:

Functional conflict means<em> encouraging workers to communicate different points of view and address disagreements in a healthy manner that can promote new ideas and new innovations.</em>

This compares with the unstable type of conflict that has no business advantage and only hurts the morale of interaction, productivity and workplace.

4 0
3 years ago
Other questions:
  • Software license infringement is also often called software __________.
    11·2 answers
  • A byte contains how many bits? Question 3 options:
    13·2 answers
  • Look at the following program and answer the question that follows it. 1 // This program displays my gross wages. 2 // I worked
    8·1 answer
  • Outline four types of cyber law.
    14·1 answer
  • Supplies/material used in iron​
    11·1 answer
  • Which of the data repositories serves as a pool of raw data and stores large amounts of structured, semi-structured, and unstruc
    9·1 answer
  • 69696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969
    8·1 answer
  • Question #5
    11·2 answers
  • Consider the following code segment, which is intended to simulate a random process. The code is intended to set the value of th
    13·1 answer
  • Write a function check_palindrome that takes a string as an input and within that function determines whether the input string i
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!