1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aneli [31]
3 years ago
11

For angular how can we set up th edatabse.

Computers and Technology
1 answer:
lesya [120]3 years ago
8 0
You can not communicate directly between Angular and MySQL. You'll need to build a back-end Web service that calls MySql using php or node. Angular can communicate with this back-end Web service via http.
You might be interested in
Figure out what this says:<br><br> ?driew tib a kool ti seoD
lisov135 [29]

Answer:

Does it look a bit weird?

5 0
3 years ago
Is co2+4h2--&gt; ch4 + 2h2o a combustion​
Nadya [2.5K]

Answer:

No its not a combustion its a formation.

Explanation:

7 0
3 years ago
The IP protocol (and UDP) are called "connectionless" and "unreliable." Describe what those two words mean in the context of dat
igor_vitrenko [27]

Answer:

Explanation:

In data communications, a protocol is <em>connectionless </em>if it describes communication between two devices in a network without first establishing or verifying establishment of some link (connection) between the two devices. In a connectionless protocol, data are exchanged between processes or devices without a prior check of whether the processes are ready to transmit data or not. In this type of protocol, there's no verification put in place to remember if these processes were or are in communication. Connectionless protocols are also called stateless protocols. Because connectionless protocol cannot be relied upon due to its lack of delivery-assurance policy, it is sometimes referred to as <em>unreliable protocol</em>. In other words, delivery of data packets is not guaranteed. An example of a connectionless protocol is the UDP (User Datagram Protocol).

However, if the protocol defines some checks to ascertain that there is first a connection between two communicating processes before beginning transmission, then, the protocol is <em>connection-oriented. </em>An example of this is the TCP (Transmission Control Protocol). Connection-oriented protocols are reliable since they ensure connection be made between processes before transmitting data packets.

A typical application of a connectionless/unreliable protocol is in the streaming of real time videos or voice communication where packets of data could be dropped and not resent.

An example of the connection-oriented/reliable protocol is analogous to making a telephone call where data packets (voice messages) are not sent until the receiver on the other end makes a connection.

6 0
3 years ago
The piece of hardware that contains the circuitry that processes the information coming into the computer and tells the other ha
Aleksandr-060686 [28]
The central processing unit
6 0
3 years ago
Which BIOS interrupt provides serial port services andlist down names of 9 pins of DB-9connector.
mote1985 [20]

Answer:

To help interrupt serial driven communications, the PC utilizes two interrupts, IRQ 3 and IRQ 4.

INT 0Bh and INT 0Ch are the BIOS interrupt

It patches the COM1,COM2 when you call the Com Init Intr routine: interrupt vectors (int 0Ch int 0Bh), allowing IRQ 4 and IRQ3 in the 8259A PIC.

IRQ 3  0Bh  Serial port 2

IRQ 4  0Ch  Serial port 1

<u>9 pins of DB-9 connector -</u>

1       RTS, Request to Send

2       CTS, Clear to send

3       GND,Ground

4       RXD,Receive Data

5      TXD, Transmit Data

6       DTR, Data Terminal Ready

7       DSR, Data Set Ready

8       RI, Ring Indicator

9       DCD,Data carrier detect

8 0
3 years ago
Other questions:
  • Sometimes we write similar letters to different people. For example, you might write to your parents to tell them about your cla
    9·1 answer
  • For the question below, refer to the following recursive factorial method.
    8·1 answer
  • What are three good things and three bad things about the metal pewter
    5·1 answer
  • IN JAVA Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin ty
    15·1 answer
  • What do you enter at the command prompt to prevent the shell from using to much of the systems resources?
    12·1 answer
  • Give the algorithm and flowchart for following C code:
    6·1 answer
  • Write a function that, given an array A of N integers, of which represents loads caused by successive processes, the function sh
    15·1 answer
  • What is the difference between master file and transaction file​
    10·1 answer
  • Where do file name extensions appear?
    14·1 answer
  • A _________ attack is an attack on a computer system or network that causes a loss of service to users.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!