1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Molodets [167]
3 years ago
12

What is the difference between the ISO and the OSI?

Computers and Technology
2 answers:
geniusboy [140]3 years ago
7 0

ISO it is an organzation for agreement on internationational of network communication worldwide

OSI is the model for understanding and designing a network architecture

lbvjy [14]3 years ago
6 0

Answer:ISO created OSI

Explanation:

The International Organization for Standardization (ISO) created the Open Systems Interconnection (OSI) reference model as a framework for defining standards for connecting computers

You might be interested in
One out of how many people in the world has a Fac3book account?
DanielleElmas [232]
Two highest maybe five
8 0
3 years ago
A device has an IP address of 10.1.10.186 and a subnet mask of 255.255.255.0. What is true about the network on which this devic
lawyer [7]

Answer:

Only the last number of each IP address will be unique

Explanation:

Subnet Mask is used to identify the two parts of the IP address. One is the network part that should be same for one network, and other is host part that will vary with number of computer or devices that are connected to the network.

Subnet mask is 32 bit address that are divided in 4 equal parts of 8 bits. Each 8 bit converted to decimal by varying different bits to generate 256 different decimal number combinations. It means we can vary the address range between 0 to 255. So If any 8 bit portion is 255 that means, in this section we cannot add host address.

<u>For Example</u>

In given case,

Subnet Mask = 255.255.255.0

That means first three portions are fixed and has been allocated for network part.  

The forth portion is 0 that means we can change this portion in IP address up to 255 different addresses.

So the IP address that is given can be vary as:

10.1.10. 186

10.1.10 This portion is network portion, this cannot be vary.

only the number 186 is the unique address that is particularly assigned to the devices and is vary between 0 to 255.

8 0
4 years ago
What can Strings store
horsena [70]
A string is generally considered as a data type and is often implemented as an array data structure of bytes (or words) that stores a sequence of elements, typically characters, using some character encoding. String may also denote more general arrays or other sequence (or list) data types and structures.
5 0
4 years ago
Read 2 more answers
______________is a collection of technologies for abstracting the details of how applications, storage, network, and other compu
Daniel [21]

Answer:

The correct answer to the following question will be "Cloud computing".

Explanation:

A series of technologies too abstract the specifics of how users are supplied with the software, data, network, and other computing services, called Cloud computing. On-demand, the accessibility of computer resources, database space, and computational complexity, with little or no particular active user administrators.

This term is commonly used to define network infrastructure which is available to several users over the internet.

There are different types of cloud computing. These are as follows:

  • Infrastructure-as-a-Service (IaaS).
  • Software-as-a-Service (SaaS).
  • Platform-as-a-Service (PaaS).

Therefore, Cloud computing is the right answer.

7 0
3 years ago
What programming language is used for Arduinos?
Helen [10]

For Arduinos, C++ wrappers around C are used. The goal is to hide the details with setting up and using the AVR, therefore, it's a pretty simple program.

Answer: C++

(P.S. copy and paste your question into google or safari and click on the link to reddit because there's a lot of good info about this there)

+ = <3

4 0
3 years ago
Read 2 more answers
Other questions:
  • Fluyen en tecnologia
    15·1 answer
  • One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer s
    13·1 answer
  • Keep the base of your _________ on the mouse pad or desk?
    12·2 answers
  • What are computers used for?
    14·2 answers
  • How does inertia affect a person who is not wearing a seatbelt during a collision
    8·1 answer
  • What is the term for a media piece that is ineligible for protection by copyright laws,
    15·1 answer
  • Which of the following activities does an effective team do?
    15·2 answers
  • Any correct answers will be helpful.
    13·1 answer
  • You need to implement a class that represents the state of a room or game section. The class will contain a room_id, a descripti
    15·1 answer
  • Given the tables PRODUCT (ProductID. Description. Cost) SUPPLIER (Supplier D. ContactName, Phone Number) as shown in the figure
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!