1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KatRina [158]
3 years ago
9

As asda ddg dfgd fgd dfgd dfgsdf

Computers and Technology
2 answers:
Jet001 [13]3 years ago
6 0

as asds ddg dfgd fgd dfgd dfgsdf to you too

Sergio039 [100]3 years ago
4 0

Answer:

hgghghggh

Explanation:

You might be interested in
Which type of cable is used for high-capacity trunk lines that provide main routes for telephone, cable, and internet communicat
Readme [11.4K]

Answer:

Fiber-optic cable

Explanation:

Before the cable industry transitioned to fiber-optic cables, for many years, the standard cables used for telephone, cable, and internet communications were coaxial cables. The transition was made possible because the architecture of the fiber-optic cable came with a higher capacity, more extensive bandwidth link. Unlike the coaxial or the twisted pair cable, the fiber-optic is made from glass strands that transmit light signals much quicker and to greater distances. This makes fiber-optic cables the fastest high capacity data transfer link than any other cables to ever exist.

5 0
3 years ago
Which organization issued the Credo for Communication Ethics?
Helen [10]

Answer:

National Communication Association

Explanation:

Credo for Communication Ethics was issued by National Communication Association, which was established by Western Michigan University in 1985. Communication ethics represents the idea that one's moral influences one's behavior, and one's communication too. But, it is not just about individuals: it also deals with groups, great organisations, businesses and professional organisations, i.e. every form of human communication. That includes personal communication, mass media and digital communication.

5 0
4 years ago
Read 2 more answers
The transport layer must break messages from the application layer into several _____ that can be sent to the network layer
Pie

The transport layer must break messages received from the application layer into several <u>packets</u> that can be sent to the network layer.

<h3>The layers of the OSI model.</h3>

In Computer networking, there are seven main layers in the open systems interconnection (OSI) model and these include the following in a sequential order;

  • Physical Layer
  • Data link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer

As a standard, it is a must that the transport layer break messages that are received from the application layer into several <u>packets</u> that can be sent to the network layer.

Read more on transport layer here: brainly.com/question/26177113

#SPJ12

8 0
2 years ago
Write a program in pascal to find the area of a circle
umka2103 [35]

Program Area_Circle;

Uses Crt;

Const

Pi = 3.1416;

Var

Radius : Integer;

Area : Real;

Begin

Clrscr;

Writeln('Area of a Circle Solver');

Writeln;

Write('Enter the Radius of the Circle : ');

Readln(Radius);

Area := (Pi * Radius * Radius);

Writeln;

Writeln('The Area of the Circle is ' ,Area:8:2,'.');

Writeln;

Writeln('Program Executed');

Readln;

End.

Hope this helps!

5 0
4 years ago
In the ________ step the data is either written to the file or read from the file.
nexus9112 [7]
I believe the step is <span>Insertion </span>
7 0
3 years ago
Other questions:
  • Jason wants to open a program with the command prompt window. Which command should he type in the Run dialog box to open the com
    10·1 answer
  • Television broadcasts were originally delivered by using which technology
    14·1 answer
  • "a web server that is​ specially-built to manage and deliver business intelligence is called a​ _________."
    7·1 answer
  • The part of the computer that provides access too the internet is?
    10·2 answers
  • The algorithm ADDN implements N-bit fixed-width binary addition for non-negative integers and ignores overflows. For example, AD
    13·1 answer
  • What are three to five (3-5) key differences and features in Windows Server 2016 versus 2012?
    14·1 answer
  • To hide the shaded space between pages, ____. select one:
    10·1 answer
  • Study the sentence below
    13·2 answers
  • Is number 1 correct​
    7·2 answers
  • Keely has an automation tool in place that runs a number of different processes for her and has for the last two years. All of a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!