1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bezzdna [24]
3 years ago
6

7. Accepting things that happen without trying to change them is known as

Computers and Technology
1 answer:
alukav5142 [94]3 years ago
3 0

Answer:

accept people for who they are instead of trying to change them

Explanation:

i don't know if this is right or wrong but i hope this helped you :)

You might be interested in
CottonPlus, a sportswear company, is releasing a new casual sportswear line. The company approaches a basketball star to endorse
Airida [17]

Answer: Tactics

Explanation:

  According to the given question, the tactics is one of the type of element of the given program planning that helps in illustrating the given scenario as by using the various types of tactics marketing approach we can easily promote the products in the market.

  • The tactics is one of the legal or authorized element which deals with the new products in the market.
  • In the given scenario, the Cotton Plus is one of the sportswear organization and the main strategy of the company is to approach the basketballs stars for promoting their latest collection.

 Therefore, Tactics is the correct answer.

3 0
3 years ago
What changes should be made in OSI model(Open System Interconnection).
saveliy_v [14]

Answer:

Explanation:

When most non-technical people hear the term “seven layers”, they either think of the popular Super Bowl bean dip or they mistakenly think about the seven layers of Hell, courtesy of Dante’s Inferno (there are nine). For IT professionals, the seven layers refer to the Open Systems Interconnection (OSI) model, a conceptual framework that describes the functions of a networking or telecommunication system.

The model uses layers to help give a visual description of what is going on with a particular networking system. This can help network managers narrow down problems (Is it a physical issue or something with the application?), as well as computer programmers (when developing an application, which other layers does it need to work with?). Tech vendors selling new products will often refer to the OSI model to help customers understand which layer their products work with or whether it works “across the stack”.

Layer 7 - Application

To further our bean dip analogy, the Application Layer is the one at the top--it’s what most users see. In the OSI model, this is the layer that is the “closest to the end user”. It receives information directly from users and displays incoming data it to the user. Oddly enough, applications themselves do not reside at the application layer. Instead the layer facilitates communication through lower layers in order to establish connections with applications at the other end. Web browsers (Google Chrome, Firefox, Safari, etc.) TelNet, and FTP, are examples of communications  that rely  on Layer 7.

Layer 6 - Presentation

The Presentation Layer represents the area that is independent of data representation at the application layer. In general, it represents the preparation or translation of application format to network format, or from network formatting to application format. In other words, the layer “presents” data for the application or the network. A good example of this is encryption and decryption of data for secure transmission - this happens at Layer 6.

4 0
3 years ago
Read 2 more answers
Its Inventiveness, uncertainty and futuristic ideas typically deals with science technology, what is it?
Margarita [4]

Answer:

It disrupt the established social contract, in the same way that invasive species do in natural ecosystems.

Explanation:

8 0
3 years ago
Read 2 more answers
__________ is a software-enabled technique that can change the hardcoded mac address to any mac address and thus overcome mac ad
lukranit [14]

MAC address spoofing is a software-enabled technique that can change the hardcoded mac address to any mac address and thus overcome mac address filtering.

<h3>What is MAC spoofing?</h3>

It should be noted that MAC spoofing simply means a technique for changing the factory assigned media access control to a network interface.

In this case, it is a a software-enabled technique that can change the hardcoded mac address to any mac address and thus overcome mac address filtering.

Learn more about spoofing on:

brainly.com/question/15179149

#SPJ12

6 0
2 years ago
Can You Get Commission Shortcut For FREE?
ANEK [815]

Answer:

Yeah if you look it up it says you can get it for free

6 0
3 years ago
Other questions:
  • Implement the function calcWordFrequencies() that uses a single prompt to read a list of words (separated by spaces). Then, the
    8·1 answer
  • What Linux services can pose a problem when attempting to reach remote host on a network?
    5·2 answers
  • You need to access the registry on your windows 10 computer how do you do this
    9·1 answer
  • teve wants to use Google Display Ads to reach new customers who are looking to purchase products similar to his. Which audience
    14·1 answer
  • Which component of the windows desktop allows you to retrieve files that have recently been deleted?
    11·1 answer
  • Two types of formulas in Excel, what are they? A. Complex and simple, B. General and currency, C. Logical and Boolean, D. Trig a
    15·1 answer
  • I need help I have questions I need answers in coding html,css,js and python.Fast
    7·1 answer
  • What dog breed is this
    6·1 answer
  • What is the base of a number system?
    8·1 answer
  • **HELP ME PLS**
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!