1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katovenus [111]
3 years ago
15

Why is information broken down into packets

Computers and Technology
1 answer:
SashulF [63]3 years ago
6 0

Answer:

because that how it be

Explanation:

because then you focuse packet to be separated in depth parts of a main topic like ink cooking it has four packets one for chopping one sautéing one meats and one for bake good

You might be interested in
Which of the following factors wouldn't change an account's optimization score?
MatroZZZ [7]

Answer:

Renaming Campaigns

Explanation:

Based on the information provided within the question it can be said that the factor that wouldn't change this would be Renaming Campaigns. This is because an account's optimization score is an estimate of how well the account/campaign will perform in the near future. Changing the name will not change this score since the campaign is still following the same strategy and therefore the estimates will be the same.

8 0
3 years ago
What programming language supports relational databases?
WINSTONCH [101]

A programming language that supports relational databases is SQL (Structured Query Language)

Structured Query Language (SQL), is the principal method for communicating with Relational Databases.

A relational database is a group of data elements that are linked together by predefined connections. These elements are laid up in the form of a series of tables containing columns and rows.

  • Tables are utilized for storing data about the items that will be displayed in the database.
  • A column in a database contains a specific type of data, whereas a field records the actual value of an attribute.
  • The table's rows indicate a collection of linked values for a single item or entity.

Each entry in a database can be assigned a unique identity known as a primary key, and rows from other tables can be linked together via foreign keys. This data may be accessible in a variety of ways without having to reorganize the database tables itself.

Learn more about Relational Databases here:

brainly.com/question/8457395?referrer=searchResults

5 0
2 years ago
.Write a C++ program that displays your name and address (if you value your privacy, a fictitious name and address).
olga_2 [115]

Answer:

#include <iostream>

using namespace std;

int main() {

   cout<<"My name is Rajat Sharma"<<endl<<"My address is Flat no=23 GH=5 Paschim Vihar New Delhi 110087 India"<<endl;

return 0;

}

Explanation:

The program is written in C++ language.In the program I have used cout to print my name and the address.First the name will be printed then the address in the new line endl is used for new line.To print any sentence just put them in double quotes.The same sentence in the program will be printed on the screen.

5 0
3 years ago
You can run a macro by:
oee [108]

Selecting the button assigned

Using the shortcut Keys assigned

Explanation:

By clicking the assigned button one can run a macro and we can assign a short cut key to macro which we created.

So, the two options we can use to run a macro.

7 0
3 years ago
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
BlackZzzverrR [31]

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

4 0
3 years ago
Other questions:
  • Ou have just set up a network that will use the tcp/ip protocol, and you want client computers to obtain ip configuration automa
    9·1 answer
  • The two key elements of any computer system are the____and the _____.
    7·1 answer
  • What is a row of data in a database called?<br> Field<br> File<br> Record<br> Title
    10·1 answer
  • What is the first thing you should do when troubleshooting a computer problem
    5·2 answers
  • Explain what middleware is. Name a common middleware in two-tier client/server architecture for database applications.
    10·1 answer
  • Chegg Suppose the heap is a full tree, size 2^n-1. what is the minimum number of steps to change a min heap to a max heap. Show
    5·1 answer
  • Kitchen Gadgets
    10·1 answer
  • 3. Choose the statement that best describes a ray. A ray extends forever in both directions. B ray is a part of a line with two
    10·1 answer
  • How do we find the time complexity for this algorithm?
    6·1 answer
  • What would be printed to the screen when the following program is run?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!