The correct answer would be Forums
Networking components will eventually interact with computers and devices outside of itself. Whereas during system development you are only interacting with your program internally.
For example, when you first work on a website you can begin working on it on your personal computer not connected to the outside world. When you are done working on your website you will now upload it to a webserver (or you will create your webserver) and now you are opening up the doors so to speak to the Internet. When you "open the door" you need to make sure the proper security is in place so that no one hacks your site. This is ussually done by making sure the webserver you are on does not have any known security vulnerbilities and has the proper firewall settings to prevent unauthorized access.
Answer and Explanation:
Reliability is important because if the service lacks lacks reliability this could mean losing a packet or acknowledgement which then requires retransmission.
Delay can be tolerable in different degrees by applications, for example online chatting or conferences need to have the minimum delay possible.
Jitter is the variation in delay for packets belonging to the same flow.
High Jitter: difference between delays is large
Low jitter: difference between delays is small.
Bandwidth depends on the application. In video conferences, for example, there is a need to send million of bits per second to refresh a colour screen while sending a email may not reach even a million.
Answer: keeps confidential documents secure,
displays a GUI, allocates the computer's resources, and retrieves files
Explanation:
The operating system can be defined as the software installed in the system that provides the information and services to the users by controlling the hardware, software resources, and regulates the computer programs. It runs the applications and programs in the system, displays the graphic user interface for the services, stores, manipulates, and retrieves files. It prevents the unauthorized access to the data and programs by using passwords thus provides the security to the system and documents.