1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexus [3.1K]
3 years ago
13

A layer of control in each communicating device that provides functions such as flow control, error detection, and error control

is known as a _________ protocol.
Computers and Technology
1 answer:
liubo4ka [24]3 years ago
6 0
TCP/IP protocol is the answer.
You might be interested in
Which of the following is NOT a long-term storage device?
neonofarm [45]

The storage device which is not a long-term storage device is: D. RAM.

<h3>Types of computer memory.</h3>

In Computer technology, there are two (2) main types of memory or storage location for software program (application) that are being used on a computer and these include the following;

  1. Read only memory (ROM)
  2. Random access memory (RAM)

<h3>What is RAM?</h3>

RAM is an abbreviation for random access memory and it can be defined as a volatile and temporary storage (memory) location that is used for currently opened software program (application) and computer data.

In conclusion, we can reasonably and logically deduce that the storage device which is not a long-term storage device is random access memory (RAM).

Read more on RAM here: brainly.com/question/13748829

#SPJ1

3 0
1 year ago
How many frequencies does a full-duplex qam-64 modem use?
Vsevolod [243]

The answer is 2 frequencies.

A Full-Duplex QAM 64 K Modem uses two frequencies. One frequency is used for upstream and the other for downstream. A variety of common QAM forms are available and include, 16 QAM, 32 QAM, 64 QAM, and 256 QAM. For example, for domestic broadcast use, 64 and 256 QAM are used for cable modem and digital cable TV. The modulation scheme for this modem uses both amplitude and phase.

8 0
3 years ago
Read 2 more answers
Persons who have been given access to an installation can be counted on to be of no threat. true or false? (antiterrorism scenar
aliya0001 [1]
<span>The statement that "Persons who have been given access to an installation can be counted on to be of no threat" is false. If they are not honest enough, they could become the dangerous staff the company could ever had because he or she has access to everything, files, information, etc. That is why, in selecting a person to be trusted with such responsibility, he or she undergoes an intensive training.</span>
4 0
3 years ago
Suppose you were assigned to develop a logical model of the registration system at a school or college. Would you be better off
BaLLatris [955]

Answer:

top down approach

Explanation:

Top down approach is process of breaking down system into sub-system which helps in formulating the overall system. At the end every sub system can be refined with more details.

While bottom up approach is process of gathering systems to design large complex system.

Top down is better as basic information is present and resources can be utilized effectively without impacting maintennance and operations.

6 0
3 years ago
A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the in
defon

By Tx/Rx reverse the technician can address this issue.

C. Tx/Rx reverse

<u>Explanation:</u>

Technician has to trouble the laptop, since the laptop is connected and got internet while is the network resources inside the office. But if he connects the same laptop in research lab end user is not connected

Following troubleshooting to made

1. Routing is done properly

2. Any packet dropping by using TRACE command in windows operating system.

Since DHCP is used in office, whereas same type is not used in research lab. End user can try TX/RX reverse cable to connect in the research laptop.

5 0
3 years ago
Other questions:
  • Which is an example of correct HTML?
    10·1 answer
  • Complete a graphic organizer to explain the responsibilities of a borrower
    14·1 answer
  • using C++ to sort user input. for example, user enter 25numbers and sort them from small to big or big to small, cout thesamlles
    6·1 answer
  • Write a class called (d) Teacher that has just a main method. The main method should construct a GradeBook for a class with two
    7·1 answer
  • If an Administrator performs a clean install of Windows Server 2012 R2 on a new server, and then moves critical domain services
    9·1 answer
  • What’s an example of software?
    6·2 answers
  • When would you use the AutoFit to Contents option?
    15·1 answer
  • George works for a print newspaper in which of these areas would you be interested to hire new recruits for the newspaper WHICH
    11·1 answer
  • What is one disadvantage of transmitting personal data using digital signals?
    15·2 answers
  • The ________ is the easy way to insert a new slide between existing slides.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!