1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maru [420]
3 years ago
6

Hi people this question is worth 83 points XD

Computers and Technology
2 answers:
vovikov84 [41]3 years ago
7 0
This is a great answer
konstantin123 [22]3 years ago
6 0

Answer:

no question

Explanation:

You might be interested in
The ______ sets rules for both the transport of data packets and the addressing system for a network such as the ARPANET
Phantasy [73]

The tool that sets rules for both the transport of data packets and the addressing system for a network such as the ARPANET is called; Protocol

<h3>Understanding Protocols</h3>

In computer systems communications, a protocol is defined as a set of rules and regulations that allow a network of nodes to transport and receive data information.

Now, each transport layer in a system of network such as ARAPNET will always have a protocol set such as TCP and IP.

Read more about internet protocols at; brainly.com/question/17820678

3 0
2 years ago
What is the difference between grid computing, beowulf clusters, and blade computing?
Licemer1 [7]

Answer:

 The grid computing is the type of processor architecture which basically combine all the resources of the computer system from the various type of domain for reaching the main goal. In the the grid computing all the computer perform all the task together in the network.

The main difference between the beowulf cluster and the grid computing is that the cluster is the homogeneous on the other hand the grid is heterogeneous. The grid computing can run the different types of operating system and cluster computers include similar type of operating system and hardware.

The beowulf cluster is the type of the computer cluster that are easily identical in the local area network. It basically allow the programs to be installed in the system.

Blade computing is the type of server blade in the cloud computing technology that basically refers to the high density server in the networking system. It is the compact device which is used to manage the data in the computer system.

6 0
3 years ago
What is a algorithm design ​
Mazyrski [523]

Answer:

Explanation:

Algorithm design is the branch of discrete mathematics and computer science that deals with the research, development and implementation of sequential and asynchronous algorithms. ... An algorithm is simply a sequence of instructions; a recipe is an algorithm, and so is a list of driving instructions.

6 0
4 years ago
You don’t design new software. Instead, you work with software that already exists to be sure that it keeps running smoothly. Wh
Arada [10]

Answer:

Explanation:

If you are developing software products, run complex projects, you should ... All the same, to make the right choice of an SDLC methodology, you ... Generally, there are stages involved in all the different methodologies. ... You will therefore have to keep both the old and new systems running for some time.

5 0
3 years ago
Read 2 more answers
Using technologies increase the time needed to complete a task is beneficial
nata0808 [166]

Answer:

True

Explanation:

The advent of technology has given human to achieve a whole lot more in a rather short period of time when compared to the period where the major tool of engagement and task is Manual. With technology, aside from having the ability to complete task faster, we can achieve more accurate result and a lot attractive output. All these in very little time. Technology has helped industries grow multiple times faster thus increasing input, yield and productivity. The tedious nature of having to work manually has also been expunged with repetitive task now being programmed and automated.

3 0
3 years ago
Other questions:
  • Which piece of information is most useful to an identity thief? *
    6·1 answer
  • To add artwork to a slide, the slide must contain a placeholder. <br> a. True <br> b. False
    10·1 answer
  • Which organism can process more complex information due to a central brain?
    8·1 answer
  • What does “default” refer to? the ability to be used as, or directly converted to, cash. the failure to pay back a loan. the amo
    8·1 answer
  • What may happen if a larger number of computer users are attempting to access a Web site at the same time that u r??? I think it
    5·1 answer
  • To add a glow effect to WordArt text, which of the following should be done?
    11·1 answer
  • What are some example of popular music for teenagers
    8·2 answers
  • You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the inf
    11·1 answer
  • Segregation based on laws is called _____
    11·2 answers
  • Beth is a software developer who is focused on identifying early-stage interface problems. Beth addresses the dimension of usabi
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!