1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill [66]
3 years ago
7

A _____ is a collection of rules for formatting, ordering, and error checking data sent across a network.

Computers and Technology
1 answer:
Jobisdone [24]3 years ago
3 0

Answer:

Protocol

A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design. Network protocols are the reason you can easily communicate with people all over the world, and thus play a critical role in modern digital communications.

You might be interested in
A keyword search in the library’s databases functions exactly like a regular google web search. true false
TEA [102]
False

The databases' engines only search through content in that server, while web searches (like Google and DuckDuckGo) search across the entire web
5 0
4 years ago
Give examples of applications that access files by each of the following methods:
KengaRu [80]

Answer:

Explanation:

Usually, applications would have the capability of using either one of these options. But for the sake of the question here are some that usually prefer one method over the other.

Any program that targets an API usually uses Sequential access. This is because API's contain all of the data as objects. Therefore, you need to access that object and sequentially navigate that object to the desired information in order to access the data required.

A music application would have access to an entire folder of music. If the user chooses to set the application to randomly play music from that folder, then the application will use a Random Access method to randomly choose the music file to load every time that a song finishes.

4 0
3 years ago
Helena set the price of her scarves at $20. How is she using money?
katrin [286]

Helena is using money as a unit of account.

Money is anything that is accepted and used as a means of payment for products and it used to repay debts.

Functions of money

  1. Unit of account : it is used to value goods and services. Helena values her scarves as $20.
  2. Medium of exchange : money can be used to exchange for goods and services. For example, the person who buys the scarves for $20 uses money as a medium of exchange.  
  3. Store of value : money can be kept for extended periods and it would not lose its value.

To learn more about store of value, please check: brainly.com/question/25965295

8 0
2 years ago
A new company will have 40 workstations in one building sharing a single network. All users must be able to share ¬les and print
kobusy [5.1K]

Answer:

Domain Networking.

Explanation:

A domain in networking refers to any group of workstation,users,printers devices ,database servers and computers which share different type of data via resources of network.

Hence domain networking will be the best option for the company having 40 workstation in a single building sharing a single network.

6 0
3 years ago
Write the function evens which takes in a queue by reference and changes it to only contain the even elements. That is, if the q
kvv77 [185]

Answer:

Explanation:

The following code is written in Java it goes through the queue that was passed as an argument, loops through it and removes all the odd numbers, leaving only the even numbers in the queue. It does not add any more data structures and finally returns the modified queue when its done.

  public static Queue<Integer> evens(Queue<Integer> queue) {

       int size = queue.size();

       for(int x = 1; x < size+1; x++) {

           if ((queue.peek() % 2) == 0) {

               queue.add(queue.peek());

               queue.remove();

           } else queue.remove();

       }

       return queue;

   }

3 0
3 years ago
Other questions:
  • What can help prevent issues related to downloading content from the internet
    5·1 answer
  • What is the difference between the new and open commands on the file menu
    12·1 answer
  • What is the name of the feature that can be enabled on slower-speed WAN links to prevent a large data transfer from affecting th
    10·1 answer
  • Terry is building a Web site and wants to have three main links called Home, Product Info, and Contact Us. She will create a hie
    9·1 answer
  • what sequence of tabs and buttons should hema select to include the current date on the pages printed with the speaker notes
    12·2 answers
  • The secure evidence locker is located at the ____.
    11·1 answer
  • Which statement is LEAST accurate? Select one: a. A common reason for ERP failure is that the ERP does not support one or more i
    14·1 answer
  • Jonah disagrees with the opinion expressed in the post he just read. What should he do?
    12·2 answers
  • What method does a gsm network use to separate data on a channel?
    12·1 answer
  • In the chemical reaction of baking cookies, the product is?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!