Choose the term that best matches the definition.
v rules used by a computer network.

A. Network protocol
B. Hierarchy protocol
C. Procedure

Answers

Answer 1

Answer: it’s network protocol

Explanation:

Answer 2

Answer:

A. Network protocol

Explanation:

On Edge, it states that network protocol are, "rules used by computers in a network." Therefore, it's confirmed.

I hope this helped!

Good luck <3


Related Questions

Describe the three steps involved in writing an action listener. [6 marks] (ii) A GUI application is used to multiply two numbers entered in the jTextField1 and jTextField2 textboxes and out put the result in the jTextField3 textbox. The application is designed in Netbeans and shown in the following Figure: When the multiply (x) button is double clicked the following is obtained: private void jButton1ActionPerformed(java.awt.event.ActionEvent evt) \} // TODO add your handling code here: । Write down the code required to achieve the desired function of the application. [7 marks] (b) (i) Differentiate between a thread and a process. [4 marks] (ii) Write a class that creates two threads using an anonymous subclass. The run method of the first thread prints "Thread 1 is running" and the second thread prints "Thread 2 is running". [8 marks]

Answers

The three steps involved in writing an action listener are:Implement the ActionListener interface: This is done by creating a class that implements the ActionListener interface.

This class will contain the code that specifies what action should be performed when the event occurs.Register the action listener: The action listener needs to be registered with the component that triggers the event. This is usually done using the addActionListener() method, which takes the instance of the action listener class as a parameter.Implement the actionPerformed() method: The actionPerformed() method is part of the ActionListener interface and is where the code for the desired action is written. This method is automatically called when the associated event occurs, and it should contain the logic to handle that event.

To know more about Implement click the link below:

brainly.com/question/31537146

#SPJ11

Montel needs to add a calculated field into a report that he has built that will show the total sale price of items sold in a given month. Which type of control should he add in Design view?

control box

text box

label

subreport

Answers

Answer: Label

pls mark brainleist

Answer:

D. Subreport

Explanation:

A subreport is a report inserted into another report.

Let me know if this is correct.

Hope this helps!

listen to exam instructions which of the following is a best practice when using remote desktop protocol (rdp) to access another computer? answer enable bitlocker on the remote computer. make sure both computers are in the same workgroup. implement additional security protocols. make sure both computers have the same amount of ram.

Answers

Among the above given, the best practice is to Implement additional security protocols when using the remote desktop protocol (RDP) to access another computer.

A security protocol describes the order and formats for transmitting messages with cryptographic elements between two or more parties. It is a type of communication protocol mixed with cryptographic techniques.

An attacker cannot intercept data as it is being transmitted by tapping into the air because of security mechanisms and encryption. Many people are starting to worry about possible security threats related to internet behavior and cybercrime as technology develops further.

Since the Internet was developed, many people have utilized it for their own personal advantage, leading to numerous security breaches that have significantly damaged both people's and businesses' finances. Even today, several risky security breaches can still have a negative impact on business operations despite security organizations' best efforts.

For instance, SFTP (Secure File Transfer Protocol), PGP (Pretty Good Privacy), and SMP (secure messaging protocol) are security protocols used at the application layer.

To learn more about RDP click here:

brainly.com/question/29457452

#SPJ4

Advancement made
in napier's bones

Answers

Answer:

In 1614, Edinburgh-born Renaissance scholar John Napier invented logarithms. A means of simplifying complex calculations, they remain one of the most important advances in the study and practical application of mathematics.

Explanation:

hope this will help

Chaîne d’énergie télévision

Answers

energy television channel

Which attribute allows you to create a hyperlink?
need answer now

Answers

Answer:

the href attribute

Explanation:

What factors might influence how effective a vaccine is when it’s widely released?​

Answers

Answer:

alot of people might get sick off it and some people might die bec they don't know how to use and everybody acts differnt and has differnt opinions

Explanation:

an intrinsic semiconductor has electron concentration of 1x1010cm-3; what is the hole concentration?

Answers

The number of conduction electrons in the conduction bands per unit volume of a semiconductor is known as the electron concentration, while the number of valence band holes per unit volume of the semiconductor is known as the hole concentration.

In an intrinsic semiconductor, the amount of holes and electrons are equal in number. This is as a result of it being a pure semiconductor. In this way, the quantity of holes in the valence band is equivalent to the quantity of electrons in the conduction band. The number of conduction electrons in the conduction bands per unit volume of a semiconductor is known as the electron concentration, while the number of valence band holes per unit volume of the semiconductor is known as the hole concentration.

Learn more about electrons here:

https://brainly.com/question/12001116

#SPJ4

what is C++ language ??

Answers

Answer:

C++ is an object-oriented programming language which gives a clear structure to programs and allows code to be reused, lowering development costs

Explanation:

there u go mate

Answer:

Hi brother I want to do friendship with you.

What are the motivations of hackers?

Answers

Revenge is a frequent motivation for hacking, with financial benefit or disruption being a byproduct of their anger.

This is especially true when dealing with disgruntled employees because their intimate information of their modern or former enterprise gives them a leg up in opposition to protection systems.

What are the types of hackers and motivation?

White hat hackers probe cybersecurity weaknesses to assist groups improve more desirable security; black hat hackers are motivated through malicious intent; and Gray hat hackers operate in the nebulous place in between — they're now not malicious, but they're no longer constantly ethical either.

What motivates hackers to do cyber crime?

For instance, all cybercrimes linked to ransomware, phishing, on-line economic crimes, on line fraud, password cracking, malware, hacking, sextortion are generally motivated via economic attain but for some of them motivation can be due to pranks, activism, cyber theft, espionage (e.g. malware).

Learn more about motivations of hackers here;

brainly.com/question/24108528

#SPJ4

please help me will give brainliest

please help me will give brainliest

Answers

Answer:

The person may be a farmer market person or a marketer.

Looks like they are keeping track of how many of each item that they have sold or how many of each item they have.

Which of the following statements is NOT true about Python?
a) Python is a high-level language.
b) Python can be used for web development
c) Python variables are dynamic type
d) Python is a compiled language

Answers

D

Python is an interpreted language and NOT( a compiled one, )although compilation is a step.

Answer:

D

Explanation:

D, Python is an interpreted one and not a compiled one. While the compiler scans the entire code, interpreters go line-by-line to scan it. For example, if you get a syntax, indentation or any error, you will only get one and not multiple.

Feel free to mark this as brainliest :D

Which of the following decisions involve a choice between
internal and external production?
Repurchase order
Keep-or-drop
Sell-or-process-further
Special-order
Make-or-buy

Answers

One of the decisions that involve a choice between internal and external production is make-or-buy.

This decision refers to whether a company should manufacture a particular product or service in-house or outsource it to a third-party supplier. An organization can make-or-buy anything from raw materials to finished products, services, and software, depending on its strategic objectives, capabilities, and cost considerations.
In most instances, the decision to make-or-buy involves a trade-off between the costs and benefits of internal and external production. A company should consider various factors before making the decision, such as the availability of production capacity, the level of expertise required, the cost of production, the quality standards, the lead time, and the risk involved.
For instance, if a company has enough production capacity, technical expertise, and raw materials, it may prefer to make the product in-house. This decision can help the company maintain better control over the quality, timing, and cost of production. Moreover, it can leverage its core competencies and knowledge to create unique value for customers.
On the other hand, if a company lacks the production capacity, expertise, or raw materials, or if it faces a shortage of time or money, it may prefer to buy the product or service from an external supplier. This decision can help the company reduce its production costs, avoid capital investments, and focus on its core competencies.
In conclusion, make-or-buy is one of the critical decisions that companies face in managing their production activities. The decision requires a thorough analysis of the benefits and drawbacks of internal and external production and a consideration of various factors that influence the decision. Therefore, companies must make informed decisions that align with their strategic goals, market demands, and financial objectives.

Learn more about market demands :

https://brainly.com/question/29703449

#SPJ11

4.41 an unstable lti system has the impulse response h(t) = et u(t) − e−5t u(t). for proportional feedback with g(s) = k, compute k to realize the following:

Answers

To realize the given system with proportional feedback, we need to find the value of k. to realize the given system with stable proportional feedback, we need to choose a value of k less than 4.

The closed-loop transfer function with proportional feedback is given by:
H_cl(s) = H(s) / (1 + k H(s))
where H(s) is the transfer function of the original unstable LTI system with impulse response h(t).
Using Laplace transform, we can find the transfer function of the unstable system as:

H(s) = 1 / (s - 1) - 1 / (s + 5)
Substituting this in the above equation, we get:
H_cl(s) = (s - 1) / (s^2 + 4s + k)
To make the system stable, we need to ensure that the denominator of H_cl(s) has no positive roots. This means that the quadratic equation s^2 + 4s + k = 0 should have both roots with negative real part.
Using the discriminant of the quadratic equation, we get:
4^2 - 4(1)(k) > 0
Simplifying this, we get:
16 - 4k > 0
4k < 16
k < 4
Therefore, to realize the given system with stable proportional feedback, we need to choose a value of k less than 4.

To learn more about feedback click the link below:

brainly.com/question/17118645

#SPJ11

Which two statements are true about estimating Features using Story points? (Choose two.)

a.More than one team may be involved in the estimation;

b.Story point estimation is done on cadence during backlog refinement;

c.WSJF is the best way to estimate Stories;

d.User Stories can be estimated from the top-down



Can you confirm

Answers

The two statements which are true about estimating Features using Story points include the following:

A. More than one team may be involved in the estimation.

B. Story point estimation is done on cadence during backlog refinement.

What is project management?

Project management simply refers to the strategic process of designing, planning, developing, leading and execution of a project plan or activities using a set of skills, tools, knowledge, techniques and experience to achieve the set goals and objectives of creating a unique product or service.

What is a story point?

In agile project management and development, a story point can be defined as a unit of measurement that is typically used by project manager to express an estimate of the overall amount of effort that is required to fully implement a product backlog item or the difficulty associated with a given user story.

In conclusion, we can reasonably infer and logically deduce that project teams can assign story points with respect to the following;

Work complexity or difficulty.The amount of work.Risk or uncertainty.

Read more on story points here: https://brainly.com/question/19863827

#SPJ1

Write any four advantage of computer.

Answers

Answer:

this is my answer hope you will find the right

Explanation:

Increase your productivity. ... Connects you to the Internet. ... Can store vast amounts of information and reduce waste. ... Helps sort, organize, and search through information. ... Get a better understanding of data. ... Keeps you connected. ... Help you learn and keep you informed.

There are some advantages to a computer

thank you if you like then gave point

Answer:

Any four advantages are:

1) It is fast and accurate device.

2) It is a versatile machine.

3) It has high storage capacity.

4) Computer can be used in various fields for different purposes.

you implement a plug-in that formats five columns when saving a record. editing and saving records is significantly slower after implementing the plug-in. you need to troubleshoot the plug-in. which tool should you use?

Answers

Since Editing and saving records is significantly slower after implementing the plug-in. The option that you need to troubleshoot the plug-in is D.  Microsoft Azure Application Insights.

What is the issue about?

The worker process that was running the plug-in code when this issue occurred simply crashed. Your plug-in might have caused the crash, but it might also have been another plug-in that was active for your company at the same time.

The thing that you will see is that: We are unable to glean any further details about the process's precise causes because it crashed. But after reviewing information from the crash dumps, we discovered that this typically occurs for one of the following 4 reasons:

Hence, to do this one need to:

Stack Overflow error in plugin due to unhandled exceptionWork is queued up using threads without any try/catch in the thread delegate.Memory limit reached by worker process

Learn more about troubleshoot from

https://brainly.com/question/14983884
#SPJ1

See full question below

Which tool should you use?

Select only one answer.

A.  Data Export Services

B.  Data Policies

C.  Microsoft Dataverse Analytics

D.  Microsoft Azure Application Insights

Virtual reality simulates a three-dimensional environment with which users can explore and interact. True or false?.

Answers

Main Answer:

Virtual reality simulates a three-dimensional environment with which users can explore and interact. True.

Sub heading:

what is three dimensional?

Explanation:

1.Three-dimensional space is a geometric setting in which three values are required to determine the position of an element.

2.This is the informal meaning of the term dimension.

3.In mathematics, a tuple of n numbers can be understood as the Cartesian coordinates of a location in a n-dimensional Euclidean space.

Reference link:

https://brainly.com

Hashtag:

#SPJ4

After 4 years of night school and nearly half a year waiting for the results of the bar examination, you have been admitted to practice law in your state. You decide that you have to keep your current government job while, hopefully, establishing your law practice. To do a first class job for the client, you need first class equipment i.e., good computers and printers, fax machines, etc. You stay late at the office each day to complete work on your pleadings, and you create a database on your computer to keep track of your contacts and cases. Is this an acceptable temporary solution

Answers

Answer:

yes

Explanation:

because it will make the lawyer to keep track of all is client cases without any stress

Which crew is responsible for everything on the set that is NOT electrical? Question 9 options: general crew grip crew key crew maintenance crew

Answers

The crew that responsible for everything on the set that is NOT electrical is option C: key crew.

What components make up a film crew?

Those who collaborate to make and produce films are known as film crews. Depending on the kind of movie being made, they typically include directors, producers, actors, cinematographers, editors, costume designers, and many other different types of crew members.

Hence, The assembling, disassembling, removing, and upkeep of musical and theatrical production equipment for stage performances is the responsibility of the production crew. Additionally, they move and maintain equipment between performances.

Learn more about Production crew from

https://brainly.com/question/28931927
#SPJ1

Nathan wants to implement off-site cold backups. What backup technology is most commonly used for this type of need

Answers

When implementing off-site cold backups, the backup technology that is most commonly used is tape backup technology.

Off-site cold backup is a strategy that involves storing a backup copy of data in a remote location that can be physically accessed if the need arises.

The data is typically stored on a physical medium, which may be magnetic tape or other types of storage devices. The backup process involves copying the data from the primary storage location to the backup storage medium, which is then transported to the off-site location.

The process is known as off-site cold backup because the backup medium is physically disconnected from the primary storage location, and it may take a while before the backup is available for restoration in the event of a disaster.Tape backup technology is commonly used for off-site cold backups because it offers a high level of reliability, portability, and cost-effectiveness

Learn more about backup storage at

https://brainly.com/question/32789238

#SPJ11

Which event is an example of an external risk?
A.
theft
B.
failure of machinery
C.
weak economy
D.
outdated production techniques

Answers

Answer:

Answer: C

Explanation:

A weak econemy would pose as an external risk. These types of risk are usually out of human hands and are not controllable or influenced by the company.

can
you do keyword analysis and strategy for contiki app.

Answers

Yes, keyword analysis and strategy can be done for the Contiki app. Keyword analysis is a crucial part of search engine optimization (SEO) that enables the optimization of web content for various search engines.

Keyword analysis and strategy involve conducting research to identify the most relevant keywords to target and how to use them. The analysis and strategy help in making sure that the keywords used are relevant to the content on the Contiki app. The keywords can be used on different aspects of the Contiki app, such as its title, descriptions, app content, and app screenshots.An effective keyword analysis and strategy for the Contiki app involves researching various keywords and choosing the most relevant ones to use.

The keywords chosen should have a high search volume and low competition. The keyword strategy should also include the use of long-tail keywords to enhance the app's visibility.The keyword analysis and strategy for the Contiki app should also involve monitoring and analyzing the performance of the keywords. This will help in identifying any changes or trends in user behavior and updating the keyword strategy accordingly.In summary, keyword analysis and strategy are essential for optimizing the Contiki app for search engines. By choosing the most relevant keywords and using them effectively, the app can increase its visibility and attract more downloads.

To know more about search engines visit:

https://brainly.com/question/32419720

#SPJ11

what is the name given to a process not associated with a terminal? a. child process b. parent process c. user process d. daemon proces

Answers

Answer:

d. daemon process

what are types of essential Functions? mention Ther number \& names.

Answers

The essential functions of an organization can vary depending on the specific industry and job roles within the organization. However, some common types of essential functions include: Administrative functions, Customer service functions, Sales and marketing functions, Operations functions, Human resources functions, Finance and accounting functions.

Administrative functions: These are tasks related to managing and coordinating the day-to-day operations of an organization, such as record keeping, scheduling, and budgeting.

Customer service functions: These functions involve interacting with customers, addressing their inquiries, resolving issues, and ensuring customer satisfaction.

Sales and marketing functions: These functions involve promoting and selling products or services, conducting market research, developing marketing strategies, and managing customer relationships.

Operations functions: These functions are related to the production and delivery of goods or services. They may include tasks like manufacturing, logistics, inventory management, and quality control.

Human resources functions: These functions involve managing the organization's workforce, including tasks like recruitment, training and development, performance management, and employee relations.

Finance and accounting functions: These functions deal with financial management, including tasks like budgeting, financial reporting, payroll processing, and tax compliance. It's important to note that these are general categories, and the specific essential functions within each category may vary depending on the organization

Learn more about peripheral at

https://brainly.com/question/29870891

#SPJ11

What kind of software are applications written by third-party vendors that are used by many different users and organizations

Answers

Applications written by third-party vendors that are used by many different users and organizations are typically referred to as third-party software or third-party applications.

Third-party software:

These software solutions are developed by independent companies and are designed to perform specific tasks or functions within a larger system or network. Third-party software can range from specialized tools and utilities to complex enterprise-level applications that support critical business operations. The use of third-party software can help organizations save time and resources by providing pre-built solutions that meet specific needs, rather than having to develop and maintain custom software in-house. However, it is important to carefully evaluate and select third-party vendors to ensure the security and reliability of their applications.

To know more about software visit:

https://brainly.com/question/26324021

#SPJ11

The internet service that allows users to navigate among many pages is.

Answers

Answer:

The world wide web

Explanation:

The world wide web is a hypertext information system that links internet documents and allows users to navigate through the Web, by using a computer mouse to click on “links” that go to other web pages.

Write a program that swaps the values stored/assigned in the variables x and y. You may need to define an additional variable to accomplish the task.

Answers

A program that swaps the values stored/assigned in the variables x and y is given below:

An additional variable was defined to accomplish the task.

The Program

# Python program to demonstrate

# swapping of two variables

x = 10

y = 50

# Swapping of two variables

# Using third variable

temp = x

x = y

y = temp

print("Value of x:", x)

print("Value of y:", y)

Using Naive approach

The most naive approach is to store the value of one variable(say x) in a temporary variable, then assign the variable x with the value of variable y. Finally, assign the variable y with the value of the temporary variable.

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Given a set of brand new data, tell me what approach you would take to analyze what the data is "telling you

Answers

When given a set of brand new data, it is essential to take a systematic approach to analyze what the data is telling you. This involves several steps, including data cleaning, data exploration, and data analysis. Firstly, data cleaning involves removing any errors and inconsistencies within the data.

This includes dealing with missing values, incorrect data types, and outliers. After cleaning the data, you can move on to data exploration, which involves visualizing and summarizing the data. This helps in understanding the data distribution, trends, and relationships between the variables.

Next, you can use different statistical methods to analyze the data. This includes regression analysis, hypothesis testing, and clustering. These methods help in identifying patterns within the data and testing the significance of any relationships found.Finally, it is essential to communicate the results of the data analysis effectively. This involves creating visualizations, presenting summary statistics, and explaining the findings in plain language.

This ensures that the insights gained from the data analysis can be easily understood and utilized by others.In conclusion, taking a systematic approach to analyzing new data helps in understanding what the data is telling you. This involves data cleaning, exploration, and analysis, followed by effective communication of the insights gained.

To know more about systematic visit :

https://brainly.com/question/28609441

#SPJ11

what is meant by astigmation​

Answers

Answer:

It is a condition where the eye isn't completely round

Explanation:

Answer:

is a common and generally treatable imperfection in the curvature of your eye that causes blurred distance and near vision. Astigmatism occurs when either the front surface of your eye (cornea) or the lens, inside your eye, has mismatched curves

Explanation:

Other Questions
The management function that involves creating a vision for the organization, communicating it to others, and motivating them to achieve goals is?. Add-on programs for a variety of mobile devices including smartphones and tablets. Select one: a. Clouds b. Utilities c. QR codes d. Mobile apps. All of the following use "For the Year Ended" or "For the MonthEnded" exceptStatement of financial positionStatement of cash flowsIncome statementStatement of changes in equity 2. And we, we beat our navels with our rigid fists.We, we press a hand, flat to the navel.We snap our fingers at the angry, male rain.What emotions are suggested in this stanza? How did supporter of the Constitution convince opponents to approve it? A football player runs 80 yards for a touchdown! It takes him 20 seconds. What is his speed? New Imperialism spread because of all of the following, excepta. manufacturers needed raw materials.b. bases were needed for expanding navalfleets.stc. to spread Christianity.d.to stop the spread of Social Darwinism. the wet and dry bulb thermometers will have the same readings when the air is Which action occurred as a direct result of Upton Sinclairs work?Meat industry workers were replaced by machines.New laws were passed to ensure better quality of food.Consumers began a large-scale boycott of the meat industry.People were taught how to better prepare food for consumption. Which of the following variables would be considered a time-series variable? Monthly average temperature in the US from 2010 to present Average rainfall in the 50 US states during May 2010 2020 snowfa A charge is distributed with a linear density over a rod of the length L placed along radius vector drawn from the point where a point charge q is located. The distance between q and the nearest point on linear charge is R. The electrical force experienced by the linear charge due to q is :____ Which of the following statements could be represented to determine the number ofdollars in the account at the end of 3 years?A = 1500 (1.04)3 f Berkeley Shoemakers ties compensation directly to output by paying an employee a certain amount for each unit of output produced, it is using O a system that reduces the pay of most manufacturing employees. O a piece-rate system O the Mayo system. O The Herzberg Theory HELP WHAT"S THE ANSWER FOR THIS The quantity (in pounds) of a gourmet ground coffee that is sold by a coffee company at a price of p dollars per pound is Q = f(p). (a) What is the meaning of the derivative f (5)? What are its units? The rate of change of the quantity of coffee sold with respect to the price per pound when the price is $5 per pound. The units are pounds/(dollars/pound). The rate of change of the price per pound with respect to the quantity of coffee sold when the price is $5 per pound. The units are dollars/pound. The rate of change of the price per pound with respect to the quantity of coffee sold when the price is $5 per pound. The units are pounds/(dollars/pound). The price of the coffee as a function of the supply. The units are pounds. The rate of change of the quantity of coffee sold with respect to the price per pound when the price is $5 per pound. The units are dollars/pound. Is an interest group a pressure group? What did George Washington have do with the Limited executive power? classify the following phase changes as exothermic or endothermic. exothermic process: endothermic process: How are you already using your relationship building skill? 26m18m4m39mNeed to find the area of this shape anyone?