1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
9

Individuals connect to the Internet through an __ (1) __ allowing them access to the system. The rules on the Internet for how m

essages are addressed and passed on are called __ (2) __ .
Computers and Technology
1 answer:
aleksandrvk [35]3 years ago
7 0

Answer:

1. Internet service provider (ISP)

2. Protocols.

Explanation:

Individuals connect to the Internet through an Internet service provider (ISP) allowing them access to the system. An ISP is a telecommunication company that provides internet services for other internet providers i.e they act as a backbone.

The rules on the Internet for how messages are addressed and passed on are called protocols.

A protocol can be defined as a standard set of rules established by the regulatory agencies to determine how data are transmitted from one network device to another.

Generally, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.

You might be interested in
Write a program to accept two numbers<br>in two lines and find Square root of Squares<br>of thion​
lawyer [7]

Answer: Here you go, change it however you like :)

Explanation:

num1 = int(input("Enter a number: "))

num2 = int(input("Enter a number: "))

print(f"square root of num1: {num1**0.5}")

print(f"square root of num2: {num2**0.5}")

3 0
3 years ago
Modern operating systems decouple a process address space from the machine’s physical memory. List two advantages of this design
kolbaska11 [484]

Answer: Decoupling action of the process address space refers to the physical memory of the device getting decoupled to provide  address translation in automatic way. The benefit of this method is as follows:-

  • Faster starting up of the program
  • The physical address space gets managed on its own
  • Helps in execution of large program when the main memory of the machine is of  smaller size in comparison with program

7 0
4 years ago
Answer the following questions based on your readings from Module 1. Describe a time when you or someone you observed showed a p
Mila [183]

Answer:

An example  of poor work ethic which I encountered recently was the observation of poor hygiene by an employee of a fast-food outlet of a renowned company.

Explanation:

Some patties suddenly slipped out of his hands and fell on the ground. He did not discard them and simply put them into burg adversely. ers. The fall must have soiled and contaminated them, which would affect the health of consumers. Such incidents can be avoided by the company by training the staff in such possibilities and suggesting corrective actions. Monitoring and taking action against offenders will also help. IT professionals should have good analytical and interpersonal skills besides cross-cultural sensitivity to do good in their roles.

You should apologize for his mistake for reaching the wrong place. The message should be through an electronic message ( sms ) or another instant messaging service, followed by a telephone call. The content of the message should comprise of an apology for not being able to reach in time, the reason for the misunderstanding, your current location and the approximate time it will take to reach the venue. It will be better if you share your location with the client through a GPS enabled application, so that it will be convenient to coordinate.

The tow more skills that are good for IT professionals the the skill off After sale services, and to establish a good relationship with clients.

4 0
3 years ago
What does a code of conduct include.
anygoal [31]
A code of conduct includes rules and responsibilities for the individual or party
8 0
3 years ago
Read 2 more answers
Which statement describes a disadvantage of e-government?
kicyunya [14]

Answer:

Setting up and maintaining the online systems can be expensive

Explanation:

4 0
4 years ago
Other questions:
  • Given two int variables, i and j, which have been declared and initialized, and two other int variables, itemp and jtemp, which
    14·1 answer
  • What was the second phone made in the world called?
    5·1 answer
  • Trish has bought a new computer that she plans to start working on after a week. Since Trish has not used computers in the past,
    10·1 answer
  • Write a program to define a variable size array, ask the user to enter the size of array and its elements. Then search whether a
    6·1 answer
  • What is the lower House​
    7·1 answer
  • WhAt is a jpeg do i look like i know what a jpeg is
    13·1 answer
  • Which structure does a web page normally use to define an area of focus <br>​
    9·1 answer
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
  • An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone
    13·1 answer
  • with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!