1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
luda_lava [24]
3 years ago
10

The subroutines/function calls you need to call to pass an application message down to the transport layer is called the

Computers and Technology
1 answer:
Anit [1.1K]3 years ago
4 0

Answer:

"TCP/IP library" is the appropriate answer.

Explanation:

  • A communications protocol that always connects to yet another system or device and guarantees transmissions were also correctly converted to digital signals or received, is termed as TCP/IP.
  • Technology can also do a variety of things on its own and. However, when you speak among each other devices' maximum throttle emerges.
You might be interested in
__________ intelligence is an approach to boundary spanning which results from using sophisticated software to search through in
lbvjy [14]

Answer:

Business Intelligence

Explanation:

The approach uses tools to access & analyze data sets and present analytical findings in reports, summaries, dashboards, maps, charts and graphs to provide users with detailed intelligence about the state of the business.

Business intelligence uses softwares and services to convert data into actionable insights that inform an organization’s strategic and tactical business decisions.

6 0
4 years ago
What is the output?
olga55 [171]

Answer:

The output is 28

Explanation:

Required

Determine the output of the code segment

The first line initializes "answer" to 0

The next two lines iterate through lists [2,4] and [3,5

Each of these lists have two elements; So, the number of iterations is 2 * 2 i.e. 4.

In the first iteration

numA = 2, numB = 3, answer = 0

So:

answer = answer + numA + numB= 0 + 2 + 3 = 5

In the second iteration

numA = 2, numB = 5, answer = 5

So:

answer = answer + numA + numB= 5 + 2 + 5 = 12

In the third iteration

numA = 4, numB = 3, answer = 12

So:

answer = answer + numA + numB= 12 + 4 + 3 = 19

In the fourth iteration

numA = 4, numB = 5, answer = 19

So:

answer = answer + numA + numB= 19 + 4 + 5 = 28

Lastly, the value of "answer" is printed

<em>Hence, the output is 28</em>

7 0
3 years ago
Berat wants to compare images of what the streets of New York City looked like one hundred years ago to now. Which of the follow
Vesnalui [34]

Answer:

I think the answer would be D.

7 0
3 years ago
Read 2 more answers
Complete the sentence to identify advantages of top-down programming design. Choose all that apply.
yanalaym [24]

Answer:The original choice to write apply_fg so that it accepts function arguments is a good one, because it increases interoperability. When the callable arguments to apply_fg use a single protocol, we can easily exchange them: #include <functional> float log2(float); int a = apply_fg(5.Of, int b = apply_fg(3.14f,

Explanation:

3 0
4 years ago
Read 2 more answers
What was one of the main purposes of the first computer systems?
wolverine [178]
<span>Financial transactions were one of the first purposes of computers. This is where "ticker tapes" came from; early computers were used to keep track of how stocks were performing. Computers in early days used large mainframe systems and punch cards to keep track of this type of data.</span>
6 0
4 years ago
Other questions:
  • Here are the codes for producer and consumer problems.
    10·1 answer
  • What is the opening page of a website called?
    9·2 answers
  • The unique global address for a web page or other resource on the internet is called the ________.
    7·1 answer
  • A stop sign is an example of?
    11·2 answers
  • What does the rule of five say?
    12·2 answers
  • The interaction between information technology and organizations is influenced___________.A) solely by the decision making of mi
    12·1 answer
  • ou and a friend decide to watch a movie on your computer. The movie is saved on a second hard drive on your system. When you are
    7·1 answer
  • What does it mean when a computer can't break the rules
    10·2 answers
  • Technical term of stealing personal information in social media.​
    5·1 answer
  • To extract detailed and comprehensive responses from your client, use the _____ questioning technique.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!