1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Airida [17]
3 years ago
9

Inter-enterprise pride systems are referred to as ________ because in such systems processing is divided across multiple computi

ng devices.
Computers and Technology
1 answer:
vredina [299]3 years ago
7 0
<span>Inter-enterprise PRIDE systems are referred to as distrubbuted systems because in such systems processing is divided across multiple computing devices.</span>
You might be interested in
​______________________ is a general security term that includes computer​ viruses, worms, and trojan horses.
VashaNatasha [74]
Malware
-------------------
6 0
4 years ago
Write down a scratch program which:
antoniya [11.8K]
What computer language?
4 0
3 years ago
In terms of online safety, what is the grooming process, (predators).
madam [21]
They use the weaknesses against them. if they have family issues they convince them that their parents are awful and they would be better with them. any way they could convince their pray that they would be happier with them than where they are.
5 0
4 years ago
Read 2 more answers
Consider sending a 2400-byte datagram into a link that has an mtu of 700 bytes. suppose the original datagram is stamped with th
Feliz [49]

Explanation:

Let, DG is the datagram so, DG= 2400.

Let, FV is the Value of Fragment and F is the Flag and FO is the Fragmentation Offset.

Let, M is the MTU so, M=700.

Let, IP is the IP header so, IP= 20.

Let, id is the identification number so, id=422

Required numbers of the fragment = [\frac{DG-IP}{M-IP} ]

Insert values in the formula = [\frac{2400-20}{700-20} ]

Then,        = [\frac{2380}{680} ] = [3.5]

The generated numbers of the fragment is 4

  • If FV = 1 then, bytes in data field of DG= 720-20 = 680 and id=422 and FO=0 and F=1.
  • If FV = 2 then, bytes in data field of DG= 720-20 = 680 and id=422 and FO=85(85*8=680 bytes) and F=1.
  • If FV = 3 then, bytes in data field of DG= 720-20 = 680 and id=422 and FO=170(170*8=1360 bytes) and F=1.
  • If FV = 4 then, bytes in data field of DG= 2380-3(680) = 340 and id=422 and FO=255(255*8=2040 bytes) and F=0.

3 0
4 years ago
Jenny needs to record the names of 30 students, write down the subjects they studied, and note grades in each subject after the
nevsk [136]
Mid semester and end semester. hope i helped
8 0
4 years ago
Read 2 more answers
Other questions:
  • A foreign country attempting to access government networks in order to disable a national power grid would be an example of: Sel
    7·2 answers
  • Which structure is sometimes called the "gateway to memory"?
    14·1 answer
  • the UDP server described needed only one socket, whereas the TCP server needed two sockets. Why? If the TCP server were to suppo
    8·2 answers
  • Suppose a developer gets class XYZ files and documentation from a subcontractor. This class does not implement the Comparable in
    9·1 answer
  • Explain the concept of scalability. How would you respond?
    15·1 answer
  • What is the difference between C and C++. If I know C, will it be hard to lean C++?
    15·1 answer
  • Create a cell reference in a formula by typing in the cell name or
    7·2 answers
  • First computer to use Windows os?​
    5·1 answer
  • What feature did the 32X add to the Sega Genesis?
    14·2 answers
  • A classic game, Wario Land, has an invincible main character who reacts to the environment in order to solve puzzles. So, for ex
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!