Answer:
All of the above.
Explanation:
API is an acronym for application programming interface and it can be defined as a software intermediary (computing interface) comprising of sets of codes, tools and protocols that helps software applications and the computer to communicate with each other, as well enable the exchange of data. Some examples of popular APIs are Go-ogle, Face-book, Twitter etc.
The main characteristics and functions of an application programming interface (API) includes;
I. Allows different devices to connect with each other.
II. Allows for Interactivity between devices and software.
III. Messenger program that takes requests and delivers the response back to the user.
IV. Allows the creation of applications that access the features or data of an operating system, application, or other services.
V. Specifies how software components should interact.
VI. Used when programming graphical user interface (GUI) components
Answer:
what does core mean? what are they for?
Explanation:
A core is located inside the CPU its the part that gives instructions to software to preform a certain task, the more cores, the faster software can preform a task
Log in is the feature that allows you to access your electronic account in a website, database or other, also a bank account. Your username and password are stored in cookies (files that websites use and are stored in your browser) for the session. This is true if we talk about websites.
When you're done, you log out from your account, you disconnect. Cookies are cleared (for websites) and you're out.
Answer:
Static
Explanation:
A computer or system administrator who want packets to be filter have to set or configured a filtering rules which will enable and allow the firewall to decide on which of the packets that will be allowed to function and the packets that will be denied not to function to be developed and as well installed on the firewall have to make use of what is called STATIC FILTERING reason been that STATIC FILTERING make it of necessary that the filtering rules should be developed and installed with the firewall.