1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liq [111]
3 years ago
12

The application layer in the tcp/ip protocol suite is usually considered to be the combination of ________ layers in the osi mod

el
Computers and Technology
1 answer:
navik [9.2K]3 years ago
8 0
Application Presentation and Session Layers.
You might be interested in
Define a python functions that draw a pinwheel using the pinwheel function that has input paramiters that allows you to change t
QveST [7]

Start with your draw_pinwheel() function

During each iteration of the loop decide which color to set the turtle to using the color() function

On even iterations, use color1

On odd iterations, use color2

Use an if/else statement to do the decision making

After deciding the color, surround a call to draw_triangle() with begin_fill() and end_fill() so that drawing the triangle creates a colored triangle.

If you have have forgotten, you can use an if/else to check for even/oddness in python as follows.

my_number = 3

if(my_number % 2 == 0):     # the remainder of dividing by 2 is 0

   print("The number is "+str(my_number))

   print("The number is EVEN")

else:                       # the remainder must be 1

   print("The number is "+str(my_number))

   print("The number is ODD")

Good luck <3

8 0
2 years ago
Array A is not a heap. Clearly explain why does above tree not a heap? b) Using build heap procedure discussed in the class, con
Aleksandr [31]

Answer:

Sorted Array A { } = { 1, 4, 23, 32, 34, 34, 67, 78, 89, 100 }

Explanation:

Binary tree is drawn given that the binary tree do not follow both minimum heap and maximum heap property, therefore, it is not a heap.

See attached picture.

6 0
3 years ago
In a word-processing program, what are the easily accessible icons that allow you to print, save and change fonts with a click o
Elan Coil [88]

The answer is A. tool bar

7 0
2 years ago
Does watching Beastars make me a furry? ​
jarptica [38.1K]

Answer:

Technically

Yes

Yes it does

8 0
2 years ago
1. Mobile devices have a _________ viewport that displays a web page content that fits within a mobile screen.
ale4655 [162]

Answer:

1.Mobile devices have a meta tag viewport that displays a web page content that fits within a mobile screen.

2.  A common technique for mobile websites is to hide navigation menus but to indicate their presence with a(n) hamburger, which is a symbol usually represented as three horizontal lines.​

Explanation:

  • Viewport is defined as a display screen size for websites. Before mobile phones and tablets all the websites were created with fixed  dimensions for screen display. But with the need of android, they were upgraded so that the websites fit themselves automatically on to the screen using a <meta> tag viewport.
  • Hamburger is a icon that leads to the list of different functions of a website or app. They mostly are used in android systems to give a compact view so that navigation menus could be hidden. The icon has a symbol of three horizontal lines one above the other.

I hope it will help you!

8 0
3 years ago
Other questions:
  • Two electronics technicians are looking at the representations of a silver atom and a copper atom in the figure above. Technicia
    10·1 answer
  • What is the maximum amount that OSHA can impose as a penalty on an employer for each Willful violation?
    11·1 answer
  • What is the different between image processing and machine vision? Please explain with an example.
    11·1 answer
  • _____ are independent and not associated with the marketing efforts of any particular company or brand.​
    9·1 answer
  • To achieve asymptotically optimal performance, a skip list must use promotion probability . true or false and
    14·1 answer
  • Why is it uncommon for users to perform searches directly in database tables?
    15·1 answer
  • How can your network be infected with malware or ransomware?
    6·1 answer
  • Is iphone battery being draned if plugged into car charger when listening to podcasts
    6·1 answer
  • What is the complete path and filename of the file where ports and their associated protocols are defined
    12·1 answer
  • Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addre
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!