Answer:
voice service voip
Explanation:
Voice over Internet Protocol feature allows users to make voice calls by making use of a broadband internet connection. The Voice engineer is setting up a Cisco 2951 Integrated Services Router with Cisco Unified Communications Manager Express, which happens to fall under broadband internet connection and hence the command the engineer will enter must be a voice service voip.
Answer:NO, I WILL NOT GIVE THE TELEPHONE NUMBER
WHY?
IT IS A BREACH OF TRUST
IT IS A BREACH OF DATA PRIVACY
IT ALSO VIOLATES THE PRIVACY OF INFORMATION RIGHT OF THE GIRL.
Explanation:BREACH OF TRUST is act or actions taken against the signed agreement between a person and another party which may be any Organisation like a Financial Institution where the Financial Institution agrees not to release the personal Information about their customer without the person's consent.
IT IS A BREACH OF DATA PRIVACY many persons wants their data which are made available to Organisation to be kept private,divulging such information without the person's consent is a reach of data privacy.
It violates the privacy of Information right of the Girl, except for Security or other specified reasons no Organisations or person is given the right to divulge another person's right to a third party, ALL THESE VIOLATIONS ARE PUNISHABLE UNDER THE LAWS OF THE LAND.
Answer:
A GUI based operating system is usually used in personal computers
Explanation:
The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux. Modern operating systems use a graphical user interface, or GUI (pronounced gooey).
I’d say A: Dave is partly right in his answer that gamma rays are the most dangerous, but it is because of their frequency and wavelength, not where they come from.
Gamma rays are the most intense and thus, most harmful electromagnetic waves. Gamma rays radiation poisoning is difficult to shield against. These rays have the most energy and can go through six feet of concrete and damage your DNA as well. The higher the energy waves (gamma, x-ray), the shorter the wavelengths
Answer: The differences between the flow control and congestion control are as follows:-
- Flow control's traffic is controlled in the direction from sender to receiver whereas traffic control in congestion control be handles from the entrance of the network.
- Sender is reason for the traffic in flow control while transport layer creates the traffic in congestion control.
- Transport layer and data link layer are used for managing the traffic whereas congestion control has transport and network layer for handling the traffic.
The TCP for the congestion control works as elimination of the congestion in the sender's field in network layer and transport layer.Flow control is used in TCP to make surety about the non-overwhelming nature of sender towards receiver in the transport layer and data link layer.