1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zvonat [6]
3 years ago
12

ICT Practical Work

Computers and Technology
1 answer:
Shalnov [3]3 years ago
3 0

Explanation:

ICT Practical Work

3rd Stage

In this next process, carry out an analysis of where the information travels. For which we must have read and understood the functions of the nodes.

An English executive wishes to send a letter to an Argentine colleague to organize a commercial operation.

Write a draft in English.

The secretary translates it into Spanish.

Envelopes it properly to send the letter by air.

Label it.

He takes it to the mail where it is bagged, after sorting, with other envelopes, for different destinations, in the city of Bs. As. According to the transport possibilities, they decide if it will be sent on a direct flight, or with a stopover in Rió De Janeiro.

The post office of Bs. As. Verifies the state of the envelope, because if it is damaged; You can return it to the sender or (if the destination is legible) deliver it with a warning note regarding the condition of the envelope.

The Argentine executive receives the letter and, despite agreeing with the conditions of the transaction, detects a spelling error, corrects it, and responds to his colleague.

At what point in this process, would you locate each of the following node functions? : Interface, transmission, error detection, format conversion,

You might be interested in
Joe, a user, has purchased a new mobile device that uses a different OS than his previous one. Joe wants to copy his contacts an
Oliga [24]

Answer:

C

Explanation:

Joe should backup all his data from his old mobile device to his PC and then import all the data to his new device via PC. This is the fastest way for transferring data than all the other options mentioned. Most of the time the devices with different OS cannot connect via Bluetooth so option B is not suitable here. If we talk about logging in to same email provider on the new device, it might work but it'll take a lot of time to transfer data to a new device since the data is been copied through internet. If Joe has a strong internet connection than it might be a suitable option for him but what if the connections breaks down in middle of transfer? Similarly NFC also uses internet connection, but that's not only the problem with NFC, like Bluetooth, NFC also works with similar OS devices. Apart from that NFC only transfers small payloads of data.

4 0
3 years ago
Write a C program that has the following statements: int a, b; a = 10; b = a + fun(); printf("With the function call on the righ
mart [117]

Answer:Following is the C program:-

#include <stdio.h>

int fun()//function fun of return type int and it returns value 6.

{

   return 6;

}

int main() {

  int a, b;

  a = 10;

  b = a + fun();//adds 6 to a.

  printf("With the function call on the right, ");

  printf("\n%d ",b);//printing b..

return 0;

}

Output:-

With the function call on the right,  

16

Explanation:

The function fun return the value 6 so it adds 6 to a and stores the result in b.

6 0
3 years ago
Which is a connectionless protocol in the transport layer? What are the small chunks of data called?
xeze [42]

Answer:

User Datagram Protocol (UDP) , transport-layer segment.

Explanation:

The User Datagram Protocol is popularly known as UDP. It is defined as the communication protocol which is used across the internet for any time sensitive transmission like the DNS lookup or the video playback.

The UDP provides a unreliable and connectionless service to a invoking application.

The transport layers on sending side converts the application $\text{layer }$ messages which it $\text{receives}$ from the $\text{sending application process}$ into a transport layer segment called as the transport layer segments. This is achieved by breaking down the application messages into a smaller chunks and then adding the transport layer header into each chunk so as to create a transport layer segment.

6 0
3 years ago
Read 2 more answers
What underlying concept is edge computing based on?
guajiro [1.7K]

Answer:

Edge computing was developed due to the exponential growth of IoT devices, which connect to the internet for either receiving information from the cloud or delivering data back to the cloud. And many IoT devices generate enormous amounts of data during the course of their operations.

Explanation:

8 0
2 years ago
Read 2 more answers
If you had an idea for a new software company, what would be the best approach to help make it a successful business? develop a
Klio2033 [76]

Answer:

develop a business plan to describe how to maintain and grow revenues

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Again, consider what you believe to be the goal of performing a penetration test. Why would you worry about doing any privilege
    14·1 answer
  • 2. a. Write pseudocode for a divide-and-conquer algorithm for finding valuesof both the largest and smallest elements in an arra
    11·1 answer
  • The BasicSet 2 class implements the Set ADT by wrapping an object of the Linked Collection class and:______.
    15·1 answer
  • Which of following allows you to share a file with someone that is too large to send via e-mail?
    5·1 answer
  • To say the internet has helped democratize knowledge means that
    11·1 answer
  • The following algorithm computes the average height for a list of basketball player heights. Initialize a variable sum to 0. For
    11·2 answers
  • 7. The penalties for a first-time DUI charge include a fine of __________. A. up to $500 for a BAL of .08 to .15 B. $500-$1,000
    5·1 answer
  • What values can represent a bit
    8·1 answer
  • Please choose the correct option please tell fast​
    9·1 answer
  • What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.e
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!