1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vadim26 [7]
3 years ago
11

_____ is responsible for packet forwarding. a. Transmission Control Protocol b. User Datagram Protocol c. Extensible Authenticat

ion Protocol d. Internet Protocol
Computers and Technology
1 answer:
Mazyrski [523]3 years ago
6 0

Answer:

d. Internet Protocol

Explanation:

Internet Protocols suite  are used to transport packets from the host network across other networks. This task is usually performed by optimizing the size of each available packet, which are then forwarded through the internet protocol (IP) address.

Therefore, Internet Protocol is responsible for packet forwarding.

You might be interested in
A website wants to gives out detailed information to viewers about its upcoming conference and also provides a feature for searc
Alenkinab [10]

Answer: WIREFRAME

A website wireframe, also known as a page schematic or screen blueprint, is a visual guide that represents the skeletal framework of a website.[1]:166 Wireframes are created for the purpose of arranging elements to best accomplish a particular purpose. The purpose is usually being informed by a business objective and a creative idea. The wireframe depicts the page layout or arrangement of the website's content, including interface elements and navigational systems, and how they work together.[2]:131 The wireframe usually lacks typographic style, color, or graphics, since the main focus lies in functionality, behavior, and priority of content.[1]:167 In other words, it focuses on what a screen does, not what it looks like.[1]:168 Wireframes can be pencil drawings or sketches on a whiteboard, or they can be produced by means of a broad array of free or commercial software applications. Wireframes are generally created by business analysts, user experience designers, developers, visual designers, and by those with expertise in interaction design, information architecture and user research.

3 0
4 years ago
Which of the following kinds of computing refers to an environment of servers that house and provide access to resources users a
AveGali [126]

Answer:

Cloud is the correct answer for the above question.

Explanation:

Missing Information:

    The option is missing in the question and the question suggests to choice. The option can be liberated, cloud, disperse, digital for this question in which cloud is the correct answer.

Detailed Explanation:

  • The cloud is used to store a large amount of data or information for varies users and anyone can store or modify or delete the information from anywhere.
  • This service takes money from the user and gives service to modify, edit or add the data from anywhere using the internet. When a user wants to take the service of the cloud then he needs to contact the cloud service provider, then pays money to them and then he can enjoy the service.
  • The above question wants to ask about the term which is a vast environment of databases that provide access to the users to store and mane the data and that is the cloud which is the correct answer for the above question.
7 0
3 years ago
Instructions Write a program that allows the user to enter the last names of five candidates in a local election and the number
KengaRu [80]

Here is code in java.

import java.util.*;

class Election

{ //main method

   public static void main(String args[]){

      // create an object of Scanner class to read input

      Scanner s = new Scanner(System.in);

      // string array to store name of candidates

       String name[] = new String[5];

       // int array to store vote count of candidates

       int v_count[] = new int[5];

       double p = 0;

       int i = 0, sum = 0, high =0, win = 0;

for(i = 0; i < 5;i++)

       {

          System.out.print("last name of Candidate " + (i+1) + ":");

          // read name of Candidate

          name[i] = s.next();

          System.out.print(" number of votes received: ");

          // read vote of Candidate

           v_count[i] =s.nextInt();

if(v_count[i] > high)

              {

                  // highest vote

                  high = v_count[i];

                  win = i;

              }

              // total vote count

           sum +=v_count[i];

       }

     // printing the output

      System.out.println("\nCandidate\tVotes Received\t% of TotalVotes\n");

       for(i = 0; i < 5;i++)

       {

           // % of vote of each Candidate

           p =(v_count[i]*100)/sum;

           // print the output

          System.out.println(name[i] + "\t\t" + v_count[i] + "\t\t\t" +p);

       }

       // print the total votes

      System.out.println("\nTotal Votes:\t" + sum);

      // print the Winner of the Election

       System.out.println("Winner of the Election is: " + name[win]);

   }

}

Explanation:

Create a string array "name" to store the name of candidates.Create Integer array "v_count" to store votes os each candidates.Calculate total votes of all candidates and find the highest vote amongst all candidate and print it.Find % of votes received by each candidate.Print these stats.

Output:

last name of Candidate 1:patel

number of votes received: 54

last name of Candidate 2:singh

number of votes received: 76

last name of Candidate 3:roy

number of votes received: 33

last name of Candidate 4:yadav

number of votes received: 98

last name of Candidate 5:sharma

number of votes received: 50

Candidate       Votes Received  % of TotalVotes

patel           54                      17.0

singh           76                      24.0

roy             33                      10.0

yadav           98                      31.0

sharma          50                      16.0

Total Votes:  311

Winner of the Election is: yadav

8 0
3 years ago
Andreas wants to insert an element into an email that will graphically display the values in a table. Which option should he cho
Montano1993 [528]

Answer:

D. chart

Explanation:

Correct on edg

5 0
3 years ago
A network utilizes a network access control (NAC) solution to protect against malware. When a wired or wireless host tries to co
Inessa [10]

Answer: Posture assessment

Explanation:

Posture assessment, also refers to posture validation and it is when somw set of rules are applied to the posture data which then gives an assessment of the trust level which can be placed in th e endpoint.

Posture assessment has to do with how the system security is evaluated based on the applications and the settings.

3 0
3 years ago
Other questions:
  • Drag the tiles to the correct boxes to complete the pairs.
    7·2 answers
  • Which osi reference model layer includes all programs on a computer that interact with the network?
    13·1 answer
  • You are a network security administrator for a bank and you have noticed that an attacker has exploited a flaw in OpenSSL and fo
    9·1 answer
  • Given a int variable named callsReceived and another int variable named operatorsOnCall write the necessary code to read values
    13·1 answer
  • What is software piracy?
    11·1 answer
  • State and give reason, if the following variables are valid/invalid:
    12·1 answer
  • 2. Discuss CORBA functions<br><br>​
    6·2 answers
  • The Freeze Panes feature would be most helpful for which situation?
    6·1 answer
  • What is the difference between algorithm and program?
    10·1 answer
  • Without using parentheses, enter a formula in cell F4 that
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!