1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VMariaS [17]
3 years ago
12

The backbone networks of the Internet are typically owned by long-distance telephone companies called

Computers and Technology
1 answer:
Aneli [31]3 years ago
5 0

Answer:

network service providers

Explanation:

The backbone networks of the Internet are typically owned by long-distance telephone companies called network service providers.

A network service provider can be defined as a business firm or company that is saddled with the responsibility of leasing or selling bandwidth, internet services, infrastructure such as cable lines to small internet service providers.

You might be interested in
2ND LAST QUESTION
pychu [463]

Answer:

B

Explanation:

3 0
3 years ago
Consider a tcp connection between host b and server
katrin2010 [14]
TCP stands for Transmission Control Protocol for Communication of the Internet.  It is used to  interconnect network devices on the Internet and it is a connection oriented protocol which means that the connection between the devices (in our case host b and sever C) is established and maintained until they finish to exchange messages. Source port number specifies the <span>application or services on host b and destination port number on host c. 
a. </span><span>The source and destination port numbers for the segments traveling from host c to host b are : source: 443 , destination: 2345.
b. From the destination port number (443) we can deduce that the server c that it is a web server. Port 443 is the standard port number for website which use SSL</span><span>(</span>Secure Sockets Layer<span>) .SSL is the standard security technology for establishing an encrypted link between a web server and a browser. </span>
7 0
3 years ago
Match the installation type to its description.
MariettaO [177]

Answer:

Following are the types of installation matched to its respective definitions.

<h3>Upgrade installation:</h3>

What you do when you have a computer with an existing operating system that needs to be upgraded.

This means that while working on a window when you get attracted by the update introduced recently and you upgrade your window accordingly.

For example: Updating a window from 8 to 10 or desired features.

<h3>Multiple boot installation:</h3>

What you do when you have several operating systems on one computer.

In this type of installation, a computer has different windows for different accounts. You can boot to the desired installed window by switching account.

<h3>Clean installation:</h3>

What you do on a brand new computer that has never been set up before and does not have an operating system on it yet.

It can be defined as the installation of window done very first time on to the computer. Sometimes when the window gets deleted due to virus or any other factor, the installation at that time will also be termed as Clean Installation.

<h2>I hope it will help you!</h2>
5 0
3 years ago
again assume that each of the resistors in the circuit shown above has a resistance value of 100k(question in the picture above)
Svetllana [295]
Statement A is true. R4 is not part of the circuit since it has one terminal not connected. The other resistors are in series, so the same current flows through them. Hence they will dissipate equal power.
4 0
3 years ago
Why authentication processes and features important
vladimir2022 [97]

Answer:

<u>Authentication processes</u> are extremely important because they are an extra layer of security. These processes can help keep networks secure by only permitting authorised users to access them. <u>Authentication processes</u> can be used on things such as networks, databases, websites and other network based services/platforms.

Explanation:

3 0
3 years ago
Other questions:
  • Edmund wants to visit his university's website. Which software application would he use?
    14·1 answer
  • Many of the special staff teams require leadership training, which is offered to staff with more than 1 year of service at Camp
    15·1 answer
  • What do computer viruses eat for snacks?
    7·2 answers
  • What are three ways you cite evedince
    5·2 answers
  • If a CPU receives theinstruction to multiply the byte-sized values $12 and $3E, thisaction will take place in the ______________
    13·1 answer
  • if you play creative destruction and if u have a mic and if u play it 24/7 and would like to form a team tell me your name or yo
    7·1 answer
  • Define E-Mail Write any 4 special features of E-Mail ​
    13·1 answer
  • describe the impact of technology in your life . how does it affects your human relations with other people .​
    12·1 answer
  • There is a group of 10 people who are ordering pizza. If each person gets 2 slices and each pizza has 5 slices, how many pizzas
    9·1 answer
  • Which method can be used for making a robot perform a different set of functions?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!