1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marshall27 [118]
3 years ago
15

How is the architecture converted into software code? Elaborate the steps its passes through with help of examples / Diagram.

Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
7 0

Answer:

software code 89089999990

You might be interested in
Given a effective delay of 99ms when network usage is 74%, what is the effective delay when network usage = 84% ?
NARA [144]

148.5 ms is the effective delay when network usage = 84% .

<h3>what is a computer network?</h3>
  • A group of computers sharing resources that are available on or offered by network nodes is known as a computer network.
  • Over digital links, the computers communicate with one another using standard communication protocols.
  • These connections are made up of telecommunication network technologies, which are based on physically wired, optical, and wireless radio-frequency means and may be set up in a number of different network topologies.
  • Personal computers, servers, networking equipment, and other specialized or general-purpose hosts can all function as nodes in a computer network.
  • They can have hostnames and are identifiable by network addresses.
  • After being assigned, hostnames act as recognizable labels for the nodes and are seldom updated.
  • Network addresses are used by communication protocols like the Internet Protocol to locate and identify the nodes.

To learn more about the topic, refer to the following link

brainly.com/question/8118353

#SPJ4

3 0
2 years ago
What is the size of a typical business card?
tino4ka555 [31]
A- 3.5 x 2 ...................................................
6 0
3 years ago
Read 2 more answers
Denalee<img src="https://tex.z-dn.net/?f=denalee%20quevedo" id="TexFormula1" title="denalee quevedo" alt="denalee quevedo" align
baherus [9]

Answer:

pop off

Explanation:

6 0
3 years ago
Which component of a computer controls the entire system and is often called the brain of the computer?
erastova [34]
Cpu...................................
5 0
3 years ago
Which field in a Transmission Control Protocol (TCP) header provides the next<br> expected segment?
Papessa [141]

In a Transmission Control Protocol (TCP) header next  Expected segment is provided by Acknowledgment Number

Explanation:

  • TCP is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in the Internet Protocol.
  • The fields in TCP Segment Header are Source Port, Destination Port, Sequence Number, Acknowledgement Number, Header Length, Flags, Window Size, TCP Checksum and Urgent Pointer.
  • The Acknowledgment Number is a  32 Bit number field which indicates the next sequence number that the sending device is expecting from the other device.
  • The SYN packets consume one sequence number, so actual data will begin at ISN+1. The sequence number is the byte number of the first byte of data in the TCP packet sent.
  • If the acknowledgment flag is set in the flags field, the acknowledgment number field holds the sequence number of the next byte that the receiver expects.
3 0
4 years ago
Other questions:
  • What are the main types of computer software?
    5·2 answers
  • You '' friend or ''like'' a page o your favorite social media page that advertises a
    10·1 answer
  • The __________ of a desktop computer is the case that houses the computerâs critical parts, such as the processing and storage d
    5·1 answer
  • Differentiate between the broadcasting and telecommunication
    5·1 answer
  • In social networking websites such as twitter, people leave narrow minded and subjective remarks and upload unacceptable videos.
    9·1 answer
  • A(n) ___________________ process is initiated by individuals who are subjected to forensic techniques with the intention of hidi
    6·1 answer
  • What command would Emile use in his word processing software to insert a bar chart that will automatically adjust to changes mad
    6·2 answers
  • Vegetable farming is a good source of income explain this statement<br>​
    5·1 answer
  • Write an Algorithm to print only numbers from 10 to n times using iteration structure
    8·1 answer
  • Where is the fill handle located
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!