1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svlad2 [7]
3 years ago
12

........ is a formal description of message formats and the rules for exchanging those messages

Computers and Technology
1 answer:
BabaBlast [244]3 years ago
4 0

Answer:  Protocols

Explanation: In accordance with the distributed system design. protocols are referred as the set of rules through which the exchange of messages take place in a system. It also helps in describing the format of the message in appropriate and formal way .

On the basis of protocols, the communication between the nodes present in the distributed system takes place for coordination and interchange the formatted message.  

You might be interested in
How do you resolve conflicts in your life??
amm1812

Answer:

What problems?

Explanation:

6 0
2 years ago
Providing captions and transcripts for videos on your website is a way of ensuring what?.
Reil [10]

Answer:

Accessibility

Explanation:

Makes it easier for the users to watch

5 0
2 years ago
A ____ network (or workgroup) consists of multiple windows computers that share information, but no computer on the network serv
ra1l [238]
<span>A peer-to-peer network (or workgroup) consists of multiple windows computers that share information, but no computer on the network serves as an authoritative source of user information. domain-based peer-to-peer server-based centralized</span>
5 0
3 years ago
The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont
sergiy2304 [10]

Answer:

Subject matter experts

Explanation:

Because the security organization institutes the procedures and policies to be executed, they occupy the role of Subject matter expert.

A subject matter expert is a person with a thorough and deep knowledge of a particular process, function, technology, machine, material or type of equipment. Such a person is an expert on that subject.

Therefore the information security organization occupies the role of Subject matter expert.

6 0
3 years ago
Describe shortly about the following Linux directories and theirpurpose,1. lib2. etc3. Boot4. Root5. home
Bingel [31]

Answer:

 Linux directories and their purposes are:

1) lib - Lib file contained the share object library file which necessary to boots system and this directory contain file module stored in the kernel.

2) etc - etc file is the configuration file that they are local in the machines. When the program run these file are stored in the directories. this can be static and do not executable directory.

3) Boot - Boot file are stored in the directory which required processing of linux boot and such files are included in the linux kernel of the file.

4) Root - Root file are the best user root directory and user cannot view this directories from there account. This file usually contain administrative file system.  

5) Home - Home file contained the user directory and it is the default system of linux. Home directory helps user to enable any network system to access there home directories.

5 0
2 years ago
Other questions:
  • 7 features of QBASIC
    6·1 answer
  • Which column and row references are updated when you copy the formula: =F$5+12? Value 12 Column F Column F and row 5 Row 5
    8·1 answer
  • why do programs include keyboard shortcuts for certain actions? do you prefer the mouse or the keyboard/ why?
    7·1 answer
  • You have users who connect to the corporate network using their laptops. because these computers often access confidential data,
    9·1 answer
  • A stop sign is an example of?
    11·2 answers
  • Define stubs for the functions called by the below main(). Each stub should print "FIXME: Finish FunctionName()" followed by a n
    7·1 answer
  • When you are working in Performance Monitor, in the "Add Counters" dialog box, and need more information about a particular coun
    8·1 answer
  • Design 3 classes: Computer - Superclass
    11·1 answer
  • The TCP _____ is the amount of information that a machine can receive during a session and still be able to process the data.
    5·1 answer
  • To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!