1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igomit [66]
2 years ago
7

How is DATA sent across a Network?

Computers and Technology
1 answer:
strojnjashka [21]2 years ago
5 0

Answer:

Data travels across the internet in packets. ... Packets will travel from one machine to another until they reach their destination. As the packets arrive, the computer receiving the data assembles the packets like a puzzle, recreating

got this off Google

You might be interested in
How do i cancel my brainly premium account?
Vikki [24]

Answer:

press cancel

Explanation:

5 0
3 years ago
Read 2 more answers
What kind of word is the pronoun in bold letters?
tresset_1 [31]

Answer:

Subject

Explanation:

The kind of word that is pronoun in bold letters is "Subject".

In Example

We get our paychecks on Friday, and I always need mine.

There We and I are subjects.

5 0
3 years ago
Read 2 more answers
If your cpu usage levels are greater than ___________% during most of your work session, a faster CPU can greatly increase your
motikmotik

Answer:

If your cpu usage levels are greater than 90% during most of your work session, a faster CPU can greatly increase your computer's performance

Explanation:

CPU usage level is a good indicator for the computer performance.

Generally, computers use a low portion of their CPU power. When you open an application or listen to music on your computer, CPU usage level increases. After CPU intensive process ends, the CPU usage should drop to lower level again.

But if the CPU usage level is high all the time you use the computer, then it means that either there is a problem causing continuous CPU usage or your CPU is not fast enough. In the case of latter, you'd better to have a faster CPU.

6 0
3 years ago
(1)(50%) The program converts a three-ASCII-digit number to an 8-bit unsigned binary. For example, a 3-digit number as ‘0’ (=$30
MatroZZZ [7]

Answer:

Explanation:

3 - digit number                                             8 - bit binary

0 (=$30), 1 (=$31), & 8 (=$38)                          00010010

1 (=$31), 2 (=$32), & 9 (=$39)                          10000001

2 (=$32), 3(=$33), & 0 (=$40)                          11100110

2 (=$32), 4 (=$34), & 1 (=$41)                           11110001

2 (=$32), 5 (=$35), & 2 (=$42)                           11111100

2 (=$32), 5 (=$35), & 3 (=$ 43)                           11111101

2 (=$32), 5 (=$35), & 4 (=$44)                            11111110

2 (=$32), 5 (=$35), & 5 (=$45)                            11111111              

8 0
3 years ago
You are modeling a small part of an online flight reservation system, according to the following description. A flight is a sing
Law Incorporation [45]

Answer:

Explanation:

The database schema can have following tables:

1. airport_table(apcode, apcity, apcountry)

2. airline_table(aid, aname, acountry)

3. flight_table(fid, aid, arrtime, depttime)

4. passenger_table(pid, pname, pcity, pcountry)

5 booking_table(bid, bdate, pid)

See attachment for the diagram

4 0
3 years ago
Other questions:
  • Lesson 1 (4.0 points)
    13·2 answers
  • Using the _____ model brings sellers and buyers together on the web and collects commissions on transactions between these parti
    5·1 answer
  • According to the author, there are five hedging strategies organizations can pursue. One of them is: Select one: a. commit with
    5·1 answer
  • Grbn kmjnhbgvfcdxswikmjnthbrvgt
    5·2 answers
  • A ___ is a node (or a device) that connects two different networks together and allows them to communicate.
    12·1 answer
  • Suppose that we want to multiply 500 matrices and we use the optimal parenthesization computed by the MATRIX-CHAIN-ORDER functio
    13·2 answers
  • What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any p
    12·1 answer
  • Which types of file formats are the best choice for files that may need to be edited later?
    14·1 answer
  • Cathy designed a website for a cereal brand. When users view the website, their eyes first fall on the brand name, then they vie
    14·1 answer
  • What is malware? What are some signs that malware may be impacting the performance of your computer? How can you avoid malware?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!