1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
2 years ago
13

Explain the role of protocol and standard organization in facilities interoperability in nertwork communication ​

Computers and Technology
1 answer:
Andru [333]2 years ago
8 0

Answer:

Protocols are rules created to ensure messages are properly received and understood.  The following protocol requirements must be met:

1. An identified sender and receiver;

2. Common language and grammar;

3. Speed and timing delivery; and

4. Confirmation or acknowledgment requirements.

Explanation:

You might be interested in
Does anyone have a pdf of the greatest by eddie van der meer????
gregori [183]

Answer

aight' so im finding it but i have to asnwer before someone else so look in the comments for it.

Explanation:

Just wait i getting it rn

3 0
3 years ago
What can detect 8 colors?
Semmy [17]
The color sensor if i’m correct
8 0
3 years ago
Read 2 more answers
How long does it take rblx to re open deleted acc
dedylja [7]

Answer:

(Probably) unknown

Explanation:

First off, you have to get rblx to agree to re-open a deleted, which I can imagine would take a herculean effort and most likely a stream of emails and phone calls. If they happen to archive deleted accounts, they may be able to recover it, but this is done by humans, so there is no definitive way to find out how long it would take a human to do this. If deleted accounts aren't archived, then you're outta luck because they won't be able to get it back.

4 0
3 years ago
Read 2 more answers
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
uysha [10]

Answer:

Security Tab is the correct answer.

Explanation:

The Security Tab will enable the users to authorize anyone to use that file or directory.Many clients deleted the security tab because After that nobody can alter the security privileges on the device.

  • With the help of the Security tab, we will minimize the ActiveX attacks on Internet Explorer. This option is available in the Internet Options of the dialog box.
  • Other options are incorrect because they are not related to a given scenario.
8 0
3 years ago
Write a program that applies the Euclidean algorithm to find the greatest common divisor of two integers. Input should be two in
laila [671]

Answer:

// here is code in c++.

#include <bits/stdc++.h>

using namespace std;

// function that return greatest common divisor

int g_c_d(int num1, int num2)

{

if (num1 == 0)

 return num2;

return g_c_d(num2 % num1, num1);

}

// main function

int main()

{

// variables

int num1,num2;

cout<<"enter two numbers:";

// read two numbers from user

cin>>num1>>num2;

// call the function and print the gcd of both

cout<<"greatest common divisor of "<<num1<<" and "<<num2<<" is "<<g_c_d(num1.num2)<<endl;

}

Explanation:

Read two numbers from user and assign them to variables "num1" and "num2".Call the function g_c_d() with parameter "num1" and "num2".According to Euclidean algorithm, if we subtract smaller number from the larger one the gcd will not change.Keep subtracting the smaller one then we find the gcd of both the numbers.So the function g_c_d() will return the gcd of both the numbers.

Output:

enter two numbers:5 9

greatest common divisor of 5 and 9 is 1

enter two numbers:-25 15

greatest common divisor of -25 and 15 is 5

6 0
4 years ago
Other questions:
  • To edit the text in a SmartArt graphic, what must be done first?
    5·1 answer
  • The logical view Select one: a. shows how data are organized and structured on the storage media. b. presents an entry screen to
    7·1 answer
  • What are the three major functions of a game engine?
    15·1 answer
  • In which of these places might you be most likely to find a peer-to-peer network? On the Internet In a hospital In a home In a l
    5·2 answers
  • Which of the following is a step in paraphrasing?
    14·2 answers
  • g Write a program using integers usernum and x as input, and output usernum divided by x four times. For example, if the input i
    14·1 answer
  • What file in the user account folder stores user settings?
    8·1 answer
  • GPS data can be used to track the rate and direction of plate movement. If a GPS unit measures a latitude velocity of 28.2 mm/yr
    8·1 answer
  • A friend is interested in keeping track of information about his album collection. He is not concerned about whether or not the
    11·1 answer
  • Plsssssssss help me​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!