1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
disa [49]
3 years ago
8

Explain the importance of determinism in an industrial LAN

Computers and Technology
1 answer:
nevsk [136]3 years ago
3 0

Explanation:

 Determinism in an industrial local area network (LAN) basically improve the network and allow different types of technology use in various applications.

It basically refers to the network communication that uses various types of technology in the system like time scheduling to improve the deterministic real-time communication. It basically improve the transmission and provide ability to transfer data from one point to another.

The main importance of industrial LAN that it provide more flexible and efficient ethernet network in the system. It provide communication and interconnect various types of devices in the internet for efficient communication.

You might be interested in
7. Little Big Planet advanced the platforming genre of games by __________.
patriot [66]

Answer:

Explanation:

c because it will hook the person

5 0
3 years ago
I have a lot of stuff on my pc and I want to make my pc brand new from when I bought it, How do I clean my pc to make it where i
stepan [7]
Well if your talking about physically you could get some compressed air and blow it out. Or if your talking about performance you could try to re-install the os you have on it or replace the hdd with a ssd or higher performance hard disk for it to run like new. :)
5 0
3 years ago
Read 2 more answers
An array name is a pointer constant because the address stored in it cannot be changed during runtime.
choli [55]
The answer to your question would be option B- False
5 0
2 years ago
Read 2 more answers
How can I put my keyboard back​
zvonat [6]

Flip the laptop over, take off the screws that hold the frame together. Flip it back, take off the top plate. Then, slide the keyboard back in. Replace the frame, and then rescrew the screws. Replace the back side after.

~

8 0
3 years ago
Assuming each reference costs 1 byte, and each piece of data/info costs 1 byte as well. When will a doubly linked list be more a
NeX [460]

Answer:

The circular individually linked list is more efficient for time sharing process ,when multiple application are running on pc it is responsibility of an output system to put all process on a list and execute them all by giving them piece of time and make them wait when cpu is selected to other process.

It will be more suitable for output system to use circular list as when it reaches to last of list it will be manually reaches to starting node or process.

Singly circular linked list is used when we are concerned with the memory as only one process will be allocated memory at once and there are no chances of process to go never-ending waiting.

Explanation:

8 0
3 years ago
Other questions:
  • Why Stockholder are interested in the way a company operate?
    12·1 answer
  • You work as an IT Technician for uCertify Inc. David, a user, has recently purchased a laptop computer. He is now complaining th
    14·1 answer
  • What kind of app or technology would you like to create?  Why ? <br><br><br>​
    11·1 answer
  • What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to acc
    7·1 answer
  • A bastion host allows the firewall to connect to the internal network and the perimeter network.TrueFalse
    15·1 answer
  • Is the following statement true or false?
    12·1 answer
  • Using a third-party package of your choice, write a program that reads the contents of a csv file and saves it to an Excel file.
    10·1 answer
  • I don’t understand this, i need help
    7·1 answer
  • 8.3 code practice edhesive PLEASE HELP AND HURRY
    9·1 answer
  • Attackers will sometimes put malware on USB drives and leave them in parking lots
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!