What is computer Network?​

Answers

Answer 1

Answer:

[tex]\boxed{\sf {view \: explanation}}[/tex]

Explanation:

A computer network is a network of computers that can share data among the computers.


Related Questions

Xavier wants to use a solver to find optimal solutions for a decision problem. What should he select as X in the series of clicks for this purpose: Data tab > X > Solver > Enter Solver parameters (read on) > Check "Make Unconstrained Variables Non-Negative" > Select "Simplex LP" > Solve?

Answers

Answer:

The answer is "Analyze"

Explanation:

The term Analyze is the use of a machine or critical thinking to enable more effective management by companies and their information systems, in which the Xavier wishes to use a method for solving to find ideal decision-making strategies. Its object of the series analyses X selects, that's why the "Analyze " is correct.

All of the following statements about MapReduce are true EXCEPT: MapReduce handles the complexities of network communication. MapReduce is a general-purpose execution engine. MapReduce handles parallel programming. MapReduce runs without fault tolerance.

Answers

Answer:

The correct option is;

MapReduce runs without fault tolerance

Explanation:

Map Reduce is a technique of processing or a framework of software, that is geared towards managing, sorting and handling large data by working in the Map and Reduce phases where the map function involves the dividing, filtering and sorting of the data and mapping of the split data while the reduce method involves the rearranging, summary activities having the data reduced.

ou have spent the last two hours creating a report in a file and afterwards you use cat to create a new file. Unfortunately the new file name you used was the same as the name you used for the report, and now your report is gone. What should you do next time to prevent this from happening

Answers

Answer:

The answer is "Set -o noclobber command before starting."

Explanation:

Whenever this prevent is happening we set the -o noclobber command, this command( -o noclobber ) is used to prevents its > driver to overwrite system files.  Or whenever the user may want to violate their file in certain cases. For this case, users can use > instead of just turn  -o noclobber off! Push the formal file.

You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that it provides the capabilities that will be needed by this type of PC. Which of the following should be a concern?

a. motherboard
b. CPU
c. graphics card
d. sound card

Answers

Answer:

all options

a, b and c the most important

Explanation:

&. Give three differences between a
web browser
and web page​

Answers

Answer:

The three differences between the Web page and Web browser are given below.

Explanation:

A web browser seems to be a search application that enables internet connectivity. A web-page seems to be a single document containing Website content.A web browser, including Google Chrome as well as Firefox, has become a program on oneself machine. A web page, like Google or Twitter, is what you will need the application to accessWeb browsers can view the contents of the site via the application. Webpage should be any web page and sometimes web destination. If something is opened on the internet, it's a website.

i wiil mark brainlist ​

Answers

CAD is the answer you require, but it may also be Spread sheet

Hope this helped ♥︎

what are the disadvantageous of emails

Answers

Answer:

it could lead to overload of information.. wastage information.it can cause misunderstanding and disabilities between both person.

Need internet connection.without it can't use.

it can be hacked.and also lack the personal touch..

Answer:

they can cause misunderstandings and people read with diffrent

moods

Explanation:

Which is true of ASCII and Unicode?


Every character written in Unicode can be represented in ASCII.

Every character written in ASCII can be represented using Unicode.

ASCII requires more bytes than Unicode.

ASCII and Unicode both define accented characters.

Answers

Answer:

The correct options is;

Every character written in A S C I I can be represented using Unicode

Explanation:

All characters found in A S C I I can be found in Unicode such that A S C I I is a subset of Unicode whereby the meaning of the numbers from 0 to 127 are the same in both A S C I I and Unicode

The size of the A S C I I character in 8-bit A S C I I encoding is 8 bits while a Unicode U T F - 8 encoding has between 8 bits (1 byte) and 32 bits (4-bytes)

A S C I I assigns only 127 of the 255 possible numbers that can be stored in an 8-bits character, where the spare characters are then used by P C s for accented characters, therefore, it A S C I I does not define accented characters

Answer:

Every character written in ASCII can be represented using Unicode

Explanation:

What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation of an organization, its information systems, and its facilities?

Answers

Answer:

security In-depth

Explanation:

The security in depth is a principle in which a sequence of safeguarding channels is used to secure the important data and information i.e valuation to the company. It also increased the security for a company as a whole

Therefore in the given situation, the  security In-depth required to layered the safeguarding channels to detect the infiltration

Hence, the  security In-depth is the correct answer

What does "CYBER-COCKROACH" mean??

Answers

Answer:

The cyber cockroach is the presented external anatomy of a cockroach, with labeled views of photographs from diverse angles in place of diagrams. The cyber cockroach can be navigated around the head, thorax and abdomen with possible close up views of the legs and the images are downloadable

Cyber cockroach is a useful tool for the study of insects of the Blattodea order

Explanation:

Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.

Answers

Answer:

Following are the letter to this question:

Explanation:

Dear Raju:

For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.  

For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.

And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.  

If you determine that option fits your needs, let me learn and I'll support you there.

Yours sincerely,

Dev

Question 19 :Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that people have uploaded. In the database, pictures have associated information about who uploaded them and the date. What is this an example of?

Answers

Answer:

The correct answer will be "Semi-structured data".

Explanation:

Semi-structured data comprise evidence that just isn't data collected in some kind of a traditional database management system, but then neither is content typed. It's indeed descriptive information or structured data, but that's not organized into a theoretical design, like a chart or perhaps a graph centered through an entity.

So that the given scenario is the example of semi-structured data.

Chris needs to create a simple web page with HTML. Which tool will he use? HyperText Web browser Text editor Operating software WILL GIVE 100 AND BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!1

Answers

Answer:

The answer is "Text editor".

Explanation:

It is a computer program, which is used to provide editing on the plain text, and for this editing, we use a text editor. This tool differs from word processors software because it doesn't add additional text editing metals. In this tool, we also write the HTML code, and the incorrect choice can be defined as follows:

HyperText is a wrong choice because in these two or more pages are linked and it is used to move from one page to another. The Web browser is also a wrong choice because it is used to display the design of the web page. Operating software is also a wrong choice because it system software in which all things are done.  

Answer:

text editor

Explanation:

can anyone please help me with this

Answers

Answer:

This should do it. I assume the alignment of the numbers is not important?

<!DOCTYPE html>

<html>

<head>

<style>

table {

 border-collapse: collapse;

 font: 15px Verdana;

 font-weight: bold;

}

table, td {

 border: 1px solid black;

}

td {

 width: 80px;

 height: 80px;

 text-align: center;

}

</style>

</head>

<body>

<table>

 <tr>

   <td>1</td>

   <td>2</td>

   <td>3</td>

   <td>4</td>

 </tr>

 <tr>

   <td colspan="2">5</td>

   <td>6</td>

   <td rowspan="2">7</td>

 </tr>

 <tr>

   <td>8</td>

   <td>9</td>

   <td>10</td>

 </tr>

</table>

</body>

</html>

Question 1 : Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

Answers

Answer:

The answer is "TLS and the DBMS".

Explanation:

In given- question there are two questions were included, which can be defined as follows:

The term, Transportation Layer Security is used as "TLS", that is an SSL security protocol that allows other security procedures should be used. It is an upgraded version of SSL, that works in very much the same way of  SSL, and by encrypting information and data transfer.

The DBMS is used to store, access and handle data like layout or domain name and record and file structure of the database, it meets in the business requirements, consumers can create their respective databases including DBMS.

are the network administrator for your company. You are installing a new printer in the network. When you check the print server properties, it displays the following error: Server properties cannot be viewed. The print spooler service is not running. What should you do to resolve the issue using the least administrative effort

Answers

Answer:

Will have to run the net start spooler command.

Explanation:

The printer spooler seems to be accountable for overseeing incoming faxes that have been in effect intended for handling by the printer. Whether this device stops operating, your printer won't publish documentation as well as the machine may not notice it either.To solve these problems, you'll need to run the net start spooler command using the least administrative effort.

what is network and also how many types of network are there as well

Answers

Answer:

Summary:

Type of computer networks can categorize according to their size as well as their purpose

PAN is a computer network which generally consists of a computer, mobile, or personal digital assistant

LAN ( local area network) is a group of computer and peripheral devices which are connected in a limited area

WAN (Wide Area Network) is another important computer network that which is spread across a large geographical area

A metropolitan area network or MAN is consisting of a computer network across an entire city, college campus, or a small region

WLAN is a wireless local area network that helps you to link single or multiple devices using. It uses wireless communication within a limited area like home, school, or office building.

SAN is a storage area network is a type of network which allows consolidated, block-level data storage

System area network offers high-speed connection in server-to-server applications, storage area networks, and processor-to-processor applications

POLAN is a networking technology which helps you to integrate into structured cabling

Home network (HAN) is a always built using two or more interconnected computers to form a local area network (LAN) within the home

Enterprise private network (EPN) networks are build and owned by businesses that want to securely connect various locations

Campus area network (CAN) is made up of an interconnection of LANs in a specific geographical area

A VPN is a private network which uses a public network to connect remote sites or users together

Explanation:

Answer: Network is what is making you ask these questions.

Explanation: There are many different types of networks, like wifi, something like Verizon or Sprint, stuff like that. There are so many types of networks

What do you mean by Bandwidth? Pls give full explanation

Answers

Answer:

In computing, bandwidth is the maximum rate of data transfer across a given path. It can be characterized as network bandwidth, data bandwidth, or digital bandwidth.

Explanation:

An IT firm came across a startup company that offers a new system of computer storage. It is currently in the experimental phase. Which aspect of the technology will the firm consider before adopting it?
a
internal storage
b
graphics
c
physical features
d
commercial potential

Answers

Answer:

d . commercial potential

Explanation:

The commercial potential of the technology would be a very important detail to look at before purchasing the new system of computer storage from the startup company.

This is important because the IT firm would be eager to know how the market would accept the product when it is launched. If the public does not like the product, then the firm would suffer a loss, this is why it is paramount.

Which of the following is considered information? a. A single keystroke b. All the characters on a keyboard c. An individual test score d. Average of a series of test scores

Answers

Answer:

The correct option is;

d. Average of a series of test scores

Explanation:

Information is defined as the knowledge or news which has been sent by one person and received by another such as the reply for a request for the current weather at a specific geographical location

Information is data that has been interpreted, processed, organised, put into a structured and presented within a given context that can be intelligible, meaningful and useful to people.

How are procedural and object-oriented programming approaches similar?
A. Both approaches are used when writing programs.
B. Both approaches focus on functions, modules, and processes to write programs.
C. Both approaches focus on calling attributes and behaviors to write programs.
D. Both approaches require little planning in order to write completed programs.

Answers

Answer:

A. Both approaches are used when writing programs.

Explanation:

Procedural programming (PP), also known as inline programming takes a top-down approach. It is about writing a list of instructions to tell the computer what to do step by step. It relies on procedures or routines. Object-oriented programming (OOP) is about encapsulating data and behavior into objects.

Hope this helps....

Have a nice day!!!!

Answer:

A

Explanation:

Order the steps a user needs to follow to preview and then print a document

Answers

Answer:

Click file tab, click print tab, preview document, print document.

Answer:

Click file tab, click print tab, preview document, print document.

Explanation:

Click file tab, click print tab, preview document, print document.

Help me what is that my phone I will mark brainslist

Answers

Answer:

Following are the ways to resolve this error:

Explanation:

To solve this error there two methods, that is available, which can be defined as follows:

The First way by the turn off screen time:

To turn off screen time goto the setting app on your iPad, iPhone, or other devices.In this, there is a screen time option in which we click on turn off the screen time, and confirm it.After that, go to the apps store and download the app.

The Second way by the re-login on apple id:

To re-login on apple id first, we log out it and for logout go to setting inside this go to iTunes & app store.After open this option click apple id after the click, this click in the sign-out option after sign out re-login in by your id and password. To install the app first delete the app by a tap on the app this provides the option to delete the app, then go to the apps store. In this go to the purchase option then select the option that not in the device then download the file.

You want to complete conversion tracking setup on your business website with Google Ads. You've already implemented a global sitewide tag. Your next step is to create event tags, which must be placed in the correct section of your web pages to properly function. Where's the event tag implemented on a web page?

Answers

Answer:

The answer is "Between the website tags immediately after the global site tag".

Explanation:

The event tag is used to log clicks as well as perceptions for adverts, not creative things, or to define the inventive data, It may insert more parameters.  

These Tags are code binder clips, that are added to the site and then sent to respondents to obtain and send data. In this users could use tags to monitor scrolls, track suitable formulation, gather feedback, start generating heat maps, display advertising, to your website for all kinds of applications. The API also sends event details to Google Ads, show & Video 360, Campaign Manager, Search Anzeigen 360, and google docs that use the international site tag in the JS tag.

Which decimal value (base 10) is equal to the binary number 1012?

Answers

Answer:

The decimal value of 101₂² base 2 = 25 base 10

Explanation:

The number 101₂² in decimal value is found as follows;

101₂ × 101₂ = 101₂ + 0₂ + 10100₂

We note that in 101 + 10100 the resultant 2 in the hundred position will have to be converted to a zero while carrying over 1 to the thousand position to give;

101₂ + 0₂ + 10100₂ = 11001₂

Therefore;

101₂² =  11001₂

We now convert the result of the square of the base 2 number, 101², which is 11001₂ to base 10 as follows;

Therefore converting 11001₂ to base 10 gives;

11001₂= 1 × 2⁴ + 1 × 2³ + 0 × 2² + 0 × 2 ¹ + 1 × 2⁰

Which gives;

16 + 8 + 0 + 0 + 1 = 25₁₀.

The decimal value in base 10 that is equal to the binary number 101_2 is; 5

We want to convert 101_2 from binary to decimal.

To do this we will follow the procedure as follows;

(1 × 2²) + (0 × 2¹) + (1 × 2^(0))

>> (1 × 4) + (0 × 2) + (1 × 1)

>> 4 + 0 + 1

>> 5

In conclusion, the decimal value we got for the binary number 101_2 is 5

Read more about binary to decimal conversion at; https://brainly.com/question/17546250

state the function of font group in the home tab​

Answers

Explanation:

This group provides access to all the Character Formatting commands.

how can i earn money?​

Answers

Answer:

You could get a job.

Explanation:

I know that it is sometimes impossible to get a job, because you are unable to get to anywhere, maybe because your family does not own a car, and it is too far to walk, so you could ask your neighbors if they need anything done, and they might pay you. If these don't work, then you could see if you could get a friend to drive you, and get a job, and see if they will be your taxi, but you pay them money for gas.

Hope that helps.

Answer:

maybe babysit

Explanation:

i earned a lot of money

An application programming interface (API) is: Group of answer choices the code the application software needs in order to interact with the CPU the currently active part of an application all other answers are incorrect the code to interface between an application and a peripheral like a printer the code to interface between an application and RAM

Answers

Answer:

The code the application software needs in order to interact with the CPU

Explanation:

You are trying to log in to your old computer, and can't remember the password. You sit for hours making random guesses... I'm sure you thought it was funny back when you came up with that password (chEEzburg3rz). Write a program that tells you whether your guess is correct. If it is correct, it should grant access like this: Enter password: chEEzburg3rz Access granted....
If your guess is incorrect it should deny access like this:
Enter password: lolcatZ
Access denied

Answers

Answer:

The program written in Python is as follows (See Explanation Section for detailed explanation)

password = "chEEzburg3rz"

userpassword = input("Enter Password: ")

if userpassword == password:

     print("Access granted....")

else:

     print("Access Denied")

Explanation:

The programming language was not stated; However, I answered your question using Python

The line initializes the password to chEEzburg3rz"

password = "chEEzburg3rz"

This line prompts user for input

userpassword = input("Enter Password: ")

This if condition checks if user input corresponds with the initialized password

if userpassword == password:

     print("Access granted....")  If yes, this line is executed

else:

     print("Access Denied")  If otherwise, this line is executed

When you register to take classes, the registrar office pulls up a file full of
information about you, including your contact information, the list of classes you are
currently taking, classes you have completed, and your grades. What type of
productivity software is best suited for creating and storing this kind of information?
Spreadsheet
Word processing
Presentation
Database

Answers

Answer:

Database

Explanation:

Database software is intended to develop databases and to maintain, alter, access, and obtain useful data stored within them. It is often used to store, manage, and organize information such as field names, documents, and file structures in a database. it helps users to create their own databases to meet their business specifications and requirements. It provides data flexibility, as the storage process and formats can be modified without changing the entire program inside the database.

Other Questions
Find the pH of these buffer solutions using the information provided: 1L solution containing 80g of lactic acid (MW The simplified form of the expression (5.23x + 3.76) (3.67x 6.39) is? Why do turtles hv paddle like flippers ? If 2( a^2 +b^2 ) = ( a+b)^2 , then a. a+b =0 b. a =b c. 2a =b d. ab =0 As shown in the figure below, April enters a race. She runs leftward 100 m to her horse, then she rides 500m to her truck, then she drives 1000m in a total time of 120s. What is her average velocity over the 120s period? PLEASE HELP MEEE How can a company use a scatter plot to make future sale decisions what is the period of the function F(x)=2sec(2x+3) 70 points! Please answer fast! An agent who accepts a bribe to purchase goods for a principal from a seller who is a personal friend breaches his ________ duty by taking the money, since it is the agent's duty to work only for the best interests of the principal. Group of answer choices HELP PLEASE NAME THESE COMPOUNDS topic of amines and amides please explain you steps so i can do the rest of the problems myself 10) How many possible outfit combinations come from six shirts, threeslacks, and five ties? *A 15B 18C 30D 90 What is a short summary of Tikki Tikki Tembo? Shoe stores A and B are considering selling two new styles of designer shoes resulting in the values below. A moves first and selects which style to sell first, and then B makes its selection (the payoffs at the bottom represent (Payoff A , Payoff B). What is the equilibrium path of this game? A. A will choose Black and B will choose Pink B. A will choose Pink and B will choose Pink C. A will choose Black and B will choose Black D. A will choose Pink and B will choose Black A small toy car costs $3. A large toy car costs 5 times as much as the small one. Aaron wants to buy one of each. Which equation can he use to find the cost (a) of the two cars? Nature's Garden, a new restaurant situated on a busy highway in Pomona, California, specializes in a chef's salad selling for $7. Daily fixed costs are $1,710, and variable costs are $4 per meal. With a capacity of 950 meals per day, the restaurant serves an average of 900 meals each day.Requried:a. Determine the current average cost per meal.b. A busload of 30 Girl Scouts stops on its way home from the San Bernardino National Forest. The leader offers to bring them in if the scouts can all be served a meal for a total of $150. The owner refuses, saying he would lose $0.60 per meal if he accepted this offer. How do you think the owner arrived at the $0.60 figure? Comment on the owner's reasoning.c. A local businessman on a break overhears the conversation with the leader and offers the owner a one-year contract to feed 300 of the businessman's employees one meal each day at a special price of $4.50 per meal. Should the restaurant owner accept this offer? Why or why not? A scientist wants to determine if the time it takes a certain amount of salt to dissolve changes with the change in temperature. Experiment is set up with two test tubes have full of 25C water. what are the variables being tested? Puget Sound Divers is a company that provides diving services such as underwater ship repairs to clients in the Puget Sound area. The companys planning budget for May appears below: Puget Sound Divers Planning Budget For the Month Ended May 31 Budgeted diving-hours (q) 300 Revenue ($440.00q) $ 132,000 Expenses: Wages and salaries ($11,400 + $128.00q) 49,800 Supplies ($5.00q) 1,500 Equipment rental ($2,400 + $25.00q) 9,900 Insurance ($3,800) 3,800 Miscellaneous ($510 + $1.48q) 954 Total expense 65,954 Net operating income $ 66,046 During May, the companys actual activity was 290 diving-hours.prepare a flexible budget for May. Why the answer question now correct What us 6+8(4w-7)-(2w+1) who is the greatest scientists of india??