1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
2 years ago
5

1. select the correct answer from the given options.

Computers and Technology
1 answer:
ratelena [41]2 years ago
5 0

Answer:

Microsoft Dos

Explanation:

MIcrosoft dos is an operating system/system software developed ky microsoft.

You might be interested in
________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are store
Ghella [55]

Answer:

Option C: ram

Explanation:

  • Ram stands for random access memory
  • In any computing device, RAM is a hardware part which stores Operating System (OS) and all the currently running programs, so that they can reach the processor quickly when needed.
  • RAM is the main memory of a computer and it is faster than any other storage memory present.
  • RAM is volatile. Which means that as soon as the power is cut all the data is lost. So RAM can not store data permanently.
  • Basically RAM has two types namely:
  1. SRAM (static RAM)
  2. DRAM (dynamic RAM)
6 0
3 years ago
Explain the purpose of QoS on a TCP/IP network. Define the basic purpose of IP prece- dence, Type of Service, Diffserv, and Expl
Alja [10]

Answer:

Explanation:

1.The purpose of Quality of Service (QoS) is to scrutinize and control the data traffic on a network (LAN or WAN). It is an IP concept and uses tools that have existed since the early days of IP plus newer tools and protocols that are designed to aid the provision of defined predictable data transfer characteristics.

2.It defined a mechanism for assigning a priority to each IP packet as well as a mechanism to request specific treatment such as high throughput, high reliability or low latency. In practice, only the IP Precedence part of the field was ever used.IP Precedence. When the IP Precedence type of service is enabled and a device or application upstream of the switch sets the precedence bits in the ToS byte of IPv4 packet headers, the switch uses these precedence bits to determine the outbound port queue to which the packet is sent.

3.Differentiated services. ... Differentiated services or DiffServ is a computer networking architecture that specifies a simple and scalable mechanism for classifying and managing network traffic and providing quality of service (QoS) on modern IP networks.

4.The DiffServ framework is more scalable than IntServ because it handles flow aggregates and minimizes signaling, thus avoiding the complexity of per-flow soft states at each node.

5. DiffServ can, for example, be used to provide low-latency to critical network traffic such as voice or streaming media while providing simple best-effort service to non-critical services such as web traffic or file transfers.

DiffServ uses a 6-bit differentiated services code point (DSCP) in the 8-bit differentiated services field (DS field) in the IP header for packet classification purposes. The DS field replaces the outdated IPv4 TOS field.[1]

7 0
2 years ago
Qr code is more developed than barcode​
Blizzard [7]

While a barcode only holds information in the horizontal direction, a QR code does hold information in both horizontal and vertical directions. Due to this, a QR code holds hundreds of times more information than a barcode.

With that being said they have different purposes, and there about the same developed as each other, unless you count how much information they can store.

7 0
3 years ago
A company has developed a business-critical system for its core automation process with a software vendor. Which of the followin
pychu [463]

Answer:

d. Software Configuration Management

Explanation:

A company has developed a business-critical system for its core automation process with a software vendor. Therefore, the Software Configuration Management can provide access to the source code if the licensor declares bankruptcy.

7 0
3 years ago
Which procedure is used as a physical barrier to secure data against unauthorized access in a cloud storage data center?
hichkok12 [17]

Answer:

D. Restrict user access to the server center by using keycards

Explanation:

A keycard is a modern smart plastic card with an application programming interface. It stores a digital signature on an embedded magnetized strip that is used to operate an electronic access control lock instead of using a key to open a door.

4 0
2 years ago
Other questions:
  • A(n) _______ allows an attacker to use a network structure to send large volumes of packets to a victim.
    5·1 answer
  • What kind of firewall can block designated types of traffic based on application data contained within packets?
    7·1 answer
  • Part cost Calculator Modify the GUI in your program to look like the following GUI. To do that you need to add the following to
    13·1 answer
  • Add a new row to a table by clicking in the
    10·1 answer
  • A collection of computers, printers, routers, switches, and other devices
    15·1 answer
  • Which is the following should be selected in the paragraph dialogue box to prevent page break from occurring within a paragraph
    12·1 answer
  • Which insert image option allows a user to compile, modify, and add captions to images?
    5·2 answers
  • What types of things were often NOT captured in early photographs?
    7·1 answer
  • Jason is the motion picture projectionist at the local IMAX theater. This means that he runs the huge movie projector so that cu
    12·1 answer
  • The equals method of the Object class returns true only if the two objects being compared:_________
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!