1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
3 years ago
11

What are 3 things message timing must include

Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
5 0

Answer:

1)Message Timing. Another factor that affects how well a message is received and understood is timing. ...

2)Access Method. Access method determines when someone is able to send a message. ...

3)Flow Control. Timing also affects how much information can be sent and the speed that it can be delivered.

You might be interested in
Which of the following describe a required
ELEN [110]

Answer:

The last 2 point in the given question is the correct answer to the given question i.e

  • an argument passed to the function in the  correct positional order
  • an argument wherein the number of  arguments in the function call should match  the definition of the function.

Explanation:

The required  argument are those argument that are passing to the method the in the right location order.In the required argument the number of arguments in the call method must match the definition of the function .

For example

def fun( s ): #function definition  

   print(s) #display s

fun('er')#calling

In this example  there is  function fun() in which we pass the argument 'er'  we call that function from main() .The control moves to the function definition it checks the number of argument in the calling function fun() is matched with the definition of function fun()  and print 'er'.

All the other option are not describing the required  argument that's why this is incorrect option .

8 0
4 years ago
Your server runs in quadruple-channel memory mode. How many memory controllers are being used?.
likoan [24]

Answer: four (4)

Explanation:

Quadruple means 4.

7 0
1 year ago
Thomas asked his friend for a software suite. His friend had the software suite in his computer and he copied it into a small, r
Misha Larkins [42]

Answer:

The correct answer to the following question will be "Flash memory card".

Explanation:

A flash memory card seems to be a storage (small) medium which stores data or information on fordable or remote devices using non-volatile transistor technology hardware.

  • Most newer offerings include flash storage or memory chips, even though the development of other memory innovations is underway.
  • This would be the storage mechanism from which the configuration tool was replicated by Thomas' friend.
8 0
4 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
Which agricultural CTSO has programs for middle-school and high-school students, as well as college students?
Airida [17]
National FFA is the answer to your question my guy.
4 0
4 years ago
Read 2 more answers
Other questions:
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • How many bit does four gigabyte has
    8·2 answers
  • The function below takes a string argument sentence. Complete the function to return the second word of the sentence. You can as
    5·1 answer
  • Who is a software engineer
    8·2 answers
  • Microsoft words spell checker
    9·1 answer
  • When you connect a device to your computer for the first time, Windows Media Player selects the ____ method that works best for
    15·2 answers
  • Which descriptions offer examples of Correction Services workers? Select all that apply.
    8·1 answer
  • The appropriate semaphore in C to give one more turn to writer so it can clean up IPC objects is WRITE_SEM. Is it true or false
    5·1 answer
  • The Arizona Department of Transportation has offices throughout the state. State documents are stored on a large server in a cen
    5·2 answers
  • A program with a graphical user inter-face for displaying HTML files, used to navigate the World Wide Web.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!