1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kati45 [8]
3 years ago
11

Which of these would be a good name for a variable that holds a person's first name? LastName firstName tomSmith N01

Computers and Technology
1 answer:
weeeeeb [17]3 years ago
4 0

Answer:

fistName Maybee

You might be interested in
Anyone knows how to do this??
a_sh-v [17]
I dont know how to do that
4 0
3 years ago
Electronic mail is a
skad [1K]

Answer:

A) Transmission of letter, message and memos over a communication network

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send texts and multimedia messages over the internet.

Hence, electronic mail is a transmission of letter, message and memos over a communication network. Some examples of the commonly used electronic mails platform are Yahoo, G-mail, etc.

5 0
4 years ago
What is the name of the relationship between two ospf devices that are connected together and exchange link-state information?
Rudik [331]

Answer:

FULL neighbor state.

(FULL/DR or FULL/BDR)

Explanation:

The fact that the routers are neighbors is not enough to guarantee an exchange of link status updates; they must form adjacencies to exchange link status updates. Adjacency is the next step after the process of establishing neighbors. Adjacent routers are routers that go beyond a simple Greeting exchange and act in the database exchange process. To reduce the amount of information exchange in a given segment, OSPF selects a router as a designated router (DR) and a router as a designated backup router (BDR) in each multiple access segment. The BDR is chosen as the backup mechanism in case the DR fails. The idea behind this is that routers have a central point of contact for the exchange of information. In order to verify if two routers have established an adjacency, you can use the command: show ip ospf neighbor.

Here is an example:

R1#show ip ospf neighbor

 

Neighbor ID   Pri         State               Dead Time     Address      Interface

 

203.250.12.1    1     2WAY/DROTHER  0:00:37   203.250.14.3  Ethernet0

203.250.15.1    1     FULL/DR                0:00:36   203.250.14.2  Ethernet0

203.250.13.41  1     FULL/BDR              0:00:34   203.250.14.1  Ethernet0

5 0
3 years ago
Write down the functions of network layer in your own words.ASAP pleaseeeeeee
Dima020 [189]

Answer:

The network layer is the layer is the layer 3 of the seven layer Open System Interconnect (OSI model) which functions as packet forwarder for the  intermediate routers  by implementing technologies used for switching that provides virtual circuits' logical path

The function of the network layer includes;

1) Routing and forwarding of packets to destination which enables connectionless communication

2) Enabling internetworking

3) Hierarchical host (IP) addressing

4) Sequencing of packets

5) Handling of errors

6) Control of network congestion to prevent the collapse of the network

Explanation:

7 0
3 years ago
JAVA Code:
Burka [1]
Dear ,you should ask it on stackoverflow and geekforgeelks , not here
6 0
4 years ago
Other questions:
  • Use the balanced equation of a nitrogen cycle pathway below to support the conservation of matter and energy. N2 + 8 H --> 2
    9·1 answer
  • Robert wants to start a mobile app development company that builds apps for both iOS and Android. He is researching different cr
    14·1 answer
  • 1. Do you consider Facebook, MySpace, and LinkedIn forms of disruptive or sustaining technology? Why?
    15·1 answer
  • Which of the following tasks would you most likely use a spreadsheet to complete
    15·1 answer
  • In what software development model does activity progress in a lock-step sequential process where no phase begins until the prev
    7·1 answer
  • The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for t
    7·1 answer
  • Dad Mystery
    9·2 answers
  • _____ is confirming the significance of what another person is feeling.
    9·2 answers
  • You have learned a lot about the types of careers that are involved with building a playground. Create two job descriptions of p
    7·2 answers
  • Select the best answer from the drop-down menu.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!