1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ValentinkaMS [17]
3 years ago
7

What is an example of asynchronous communication

Computers and Technology
1 answer:
alexgriva [62]3 years ago
6 0
Calling some one or emailing some one is an example of <span>asynchronous communication</span>
You might be interested in
An administrator needs to make sure that video conferencing is allocated a high portion of bandwidth within a company network. W
frosja888 [35]

Answer:

QoS

Explanation:

We could use a blacklisting or a MAC filtering to remove from the network, and in this way, we're going to get a high portion of bandwidth, but other must work too, and the whitelisting have almost the same function, but QoS Quality of service is specifically for these cases where we need high bandwidth for a video conference, we can make this with some tools or techniques like jitter buffer and traffic shaping.

4 0
3 years ago
This is your code.
guapka [62]

Answer:

35

Explanation:

List E is a 2 dimensional array. We want index 1 of E, which is B. Now we have an index of that list B, it is index 0 so 35.

7 0
2 years ago
Alex, a web designer, is assigned the task of creating a mobile device-friendly website for a leading fashion outlet called AllS
Katyanochek1 [597]

Answer: Pulldown menus

Explanation:

Pulldown menus refer to the graphical control element, that is identical to a list box, which enables user to be bake to select one value from a list.

They're regarded as the menu of options that will appear when an item is selected with a mouse. In this case, the item that the user selected will show at the top of the display screen, while the menu appears will show below it.

Therefore, Alex should use the pulldown menus to hide the long list of hypertext links so that it appears only in response to a tap of a major heading in the navigation list.

6 0
3 years ago
An analyst receives an alert from the SIEM showing an IP address that does not belong to the assigned network can be seen sendin
lianna [129]

Answer: (A)  Firewall; implement an ACL on the interface

Explanation:

 According to the question, for re-mediate the issue firewall should be implemented the ACL (Access control list) on the given interface. The access control list is one of the type of logic which selectively give permission or deny the number of packet in the system which to through the interface.

Firewall is the type of device that basically examine the traffic in the network system and also make several decisions in the system. ACL is the set of rule which mainly define the route of the packet in the router interface state.

4 0
3 years ago
Overnight Delivery Service delivers a package to Pam. At the request of Overnight's delivery person, to acknowledge receipt Pam
SSSSS [86.1K]

Answer:

Option b (a digitized handwritten signature) would be the right option.

Explanation:

  • Another photograph of such a handwritten signature was used to digitally sign transcripts that would be perceived to have become a "digitized signature."
  • Those same kinds of signature verification may take a glance official, but they don't protect against widespread fraud, a vital component of every other internet signature.

The latter available options weren’t connected to the type of situation in question. So the response above would be the correct one.

3 0
3 years ago
Other questions:
  • In these ones all your finding is the mean(average).
    14·1 answer
  • why is this message poor or ineffective ,Due to low profits,there will be no annual year-end bonus this year. We hope to have a
    13·2 answers
  • Write a pseudocode algorithm which asks the user to enter a password.if the user enters “NotAtHome” then print “welcome”
    15·1 answer
  • Which is the biggest known issue specific to satellite Internet connections?
    13·2 answers
  • Im new what are points
    6·2 answers
  • What is the multiple source test
    15·1 answer
  • is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
    6·1 answer
  • someone please do this for and send a screeshot or picture please its really important for my examsss :D​
    9·1 answer
  • Open a Python interpreter. Python can show you the set of currently known names if you type dir(). While these values may vary f
    7·1 answer
  • Pictures in the _____ gallery give the appearance of a physical object, such as water drops or sand, that can give your presenta
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!