Which best describes how information is sent on the internet?

Answers

Answer 1

Answer:

a. The information is first sent via a Broadband for efficient transmission, and if not successful, only then it is resent via a Baseband that exists as a backup network as packets b. The message is first broken down into small packets before being sent, then they are

Explanation:


Related Questions

Creating a map of your current knowledge is called __________. a. critical reading c. pre-questioning b. collaborative learning d. concept-mapping please select the best answer from the choices provided a b c d

Answers

Creating a map of your current knowledge is called  Concept-mapping. Check more about  Concept-mapping below.

What is concept mapping?

Concept maps are known to be visual depiction of information or human knowledge. They can be shown on a charts, graphic organizers, etc.

Therefore, Creating a map of your current knowledge is called  Concept-mapping as it involves bringing out one's intellectual.

Learn more about knowledge from

https://brainly.com/question/24621985

#SPJ4

True or false computers are an application of the on-off principle

Answers

Answer: True.

Explanation:

Computer circuits are binary in concept, having only two possible states. On or off. We cannot put them into a half awake half sleeping state like humans can be in. Therefore the answer is true.

Sum of Two Numbers: Write a program that stores the integers 50 and 100 in variables and stores the sum of these two in a variable named total. Display the total on the screen.

Answers

Answer:

fifty = 50 #variable to store 50

hundred = 100 #variable to store 100

total = fifty + hundred #add the two in a variable named total

print(total) #display on screen

Explain why the connection times out despite adding the 'permit' statement for the End_User network to the ACL.

Answers

The connection timed out despite adding the 'permit' statement for the End_User network to the ACL because permission to be granted access was denied.

What is ACL?

ACL is an acronym for access control list which is the list of permissions that are related to the computer system network.

When an End-User is denied access to a network even after obtaining a permit statement, is could be that the End-User system has not been added to the list.

Learn more about network here:

https://brainly.com/question/26956118

____ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.

Answers

Answer:

Network forensics

Explanation:

hide the most valuable data at the innermost part of the network.

APCPS B U10L12 exam (Connexus)


Hi if anyone has done this already, I would appreciate if you could help.​

Answers

I don't know how to that i don't even know how to do my work

3.7 Code Practice
can someone write a code for me

Answers

Answer:

Explanation:

raaaaa faraon- yt:

love shady



If I want to make it look like slide number one is turning a page to slide number two, what
effect needs to be applied?

Answers

Answer:

Im not certain but I think thwir is one called flip

Explanation:

Kind of works like a book if thats what your asking for

Write a code snippet that asks the user to enter a name and a major repeatedly one at a time and creates a dictionary with keys corresponding to names and values corresponding to majors. Your code should include: d

Answers

The code snippet is an illustration of dictionary;

Dictionary are used to hold values in pairs i.e. data and key pairs

The code snippet

The program written in Python, where comments are used to explain each line is as follows:

#This gets the number of inputs

n = int(input("Number of inputs:"))

#This creates a dictionary

d = {}

#This iterates from 0 to n-1

for i in range(n):

   #This gets the keys i.e. names

   keys = input()

   #This gets the values i.e. majors

   values = input()

   #This populates the dictionary

   d[keys] = values

#This prints the dictionary

print(d)

Read more about Python programs at:

https://brainly.com/question/26497128

A ____ is an outdated and inefficient networking device that accepted signals from a transmitting device and repeated those signals to all other connected devices in a broadcast fashion

Answers

Answer:

Hub

Explanation:

A hub is an inefficient old device that broadcasts a given message to all nodes connected to the interfaces on it. It has a high security risk.

What initialization vector (IV) do most weak implementations of the Wireless Equivalency Protocol (WEP) use

Answers

24 bits is an initialization vector (IV) which is used by most weak implementations of the Wireless Equivalency Protocol (WEP).

What is Wireless Equivalency Protocol (WEP)?

Wireless Equivalency Protocol (WEP) can be defined as a standard wireless protocol that is designed and developed to provide a significant level of security and privacy on 802.11b wireless local area network (WLAN).

According to the IEEE Wireless Fidelity (Wi-Fi) standard, 24 bits is an initialization vector (IV) which is used by most weak implementations of the Wireless Equivalency Protocol (WEP).

Read more on Wireless Equivalency Protocol here: https://brainly.com/question/13697151

#SPJ1

________ speeds time to insights and enables better data governance by performing data integration and analytic functions inside the database.

Answers

↓Answer↓

In-database analytics speeds time to insights and enables better data governance by performing data integration and analytic functions inside the database.

can I have some help?

Answers

Answer: String

Explanation: A int would be the for a number. A string is for word(s). Hope this helped!

Answer:

A is correct, it is widely used, and it also sounds good.

Explanation:

Strings are connected, such as coding and bricks. For example "A string of events." String is widely used in lots of subjects, including coding. It is also easy to spot.

In what ways can information be slanted in a news report?

Answers

Answer:It all depends on who the reader is likely to be and the information they’ll want.

Explanation:

Newspaper 1: Company wins contract

Newspaper 2: Previous company loses contract (equally true)

Newspaper 3, say a student paper in the local town: Prospects for new jobs open up as company wins contract.

How are computers classified into different types? Explain ​

Answers

Computers differ based on their data processing abilities. They are classified according to purpose, data handling, and functionality. ... According to data handling, computers are analog, digital, or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

Help me with this question please

Answers

Nested loop im pretty sure

what special problems can occur with wireless networks

Answers

Distance from the router, as well as floors, walls, and large metal objects between a device and the router can interfere with wireless connectivity. Piggybacking, if you fail to secure your wireless network, anyone with a wireless-enabled computer in range of your access point can use your connection. Network congestion, Routers or other network equipment are overloaded with too much traffic. Speed Mismatch. This occurs when multiple users try to make use of the same server. I could go on and on.

Hope this helps!
Please give Brainliest!

what word makes this inappropriate????

Answers

Hm. Maybe it’s a glitch? Maybe it thought of something dirty? :/

Help me with this question asap please :)

Answers

Answer:

I think it's sequence as there is a pattern of connection in the words

What could cause an external drive, like a usb flash drive, to not be recognized when plugged into a computer?.

Answers

The reasons for a flash drive being not recognized when plugged in are the drive can be corrupt or broken, the port of the computer may be broken.

What is a USB flash drive?

A USB flash drive is a drive is a small device that connect devices with computer or insert data to the computer.

A USB have capacity to hold data within, and the data can be transported to anywhere.

Thus, the reasons for a flash drive being not recognized when plugged in are the drive can be corrupt or broken, the port of the computer may be broken.

Learn more about USB flash drive

https://brainly.com/question/14144068

#SPJ1

The date you type at the beginning of a letter or report should be the date that the document is _____.

Answers

The date that is typed at the beginning of a letter or report should be the date that the document is:

Written

What is the Date of a Letter or Report?

Typically, the first date that is seen at the beginning of a report a document often connotes the date of writing.

For instance, if the letter or report was written today, it will bear today's date. This will help the recipient to have a clear understanding of the time frame.

Learn more about letter writing here:

https://brainly.com/question/1155995

#SPJ4

what are the 3 components that make up the ribbon for microsoft?

Answers

Answer:

1. Quick access toolbar (QAT)

2. tabs

3. command buttons

Explanation:

hope this helps:)

Choose the missing term.

___ time

time.sleep(3)

1.form
2.insert
3.import

Answers

Answer:

import

Explanation:

the import keyword is used to import external modules into a python script.

You can click the tabs at the bottom of a workbook to switch between.

Answers

Notes or screens? I think

Kai recently graduated from college with a dual degree—a Bachelor’s in Game Design and Development and a Bachelor’s in Music. The goal is to find a job that will use both degrees, and there is an interview at a video game design studio tomorrow. Kai would love to be in charge of planning, authoring, and implementing the soundscape for games, including sound effects, music, and dialogue. What role at the video game studio would be a good fit?
character rigger

audio designer

artificial intelligence programmer

cinematic artist

Answers

Audio designer

Audio designers plan , sound effects, music and pretty much anything that has to do with sound in a video game

Which of the following statements is true of hackers? Check all of the boxes that apply.
They are sometimes differentiated into two types, called “gold hats” and “silver hats.”
Some hackers are criminals.
Some hackers do it as a form of protest.
Some hackers are network security professionals who want to improve the security of a network by identifying flaws.

Answers

Answer:

B. Some hackers are criminals

C. Some hackers do it as a form of protest

D. Some hackers are network security professionals who want to improve the security of a network by identifying flaws.

Explanation:

Edge 2022

The following statements are true of hackers: Some hackers are criminals, some hackers do it as a form of protest, and some hackers are network security professionals who want to improve the security of a network by identifying flaws. Thus, the answer would be options (B), (C), and (D).

What is hacking?

Hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system. Hacking is not always a harmful act, however, it is most usually linked with illicit activities and data theft by cyber-criminals.

Hacking is the exploitation of technology such as computers, smartphones, tablets, and networks to cause harm or corruption to systems, acquire information on users, steal data and documents, or disrupt data-related activity.

Hackers commit crimes and some hackers use it to express their protest. Some hackers are network security specialists who seek to enhance network security by uncovering flaws.

Therefore, the answer would be options (B), (C), and (D).

Learn more about the hacking here:

https://brainly.com/question/14835601

#SPJ5

When running a spelling and grammar check, which of these options in the "not in dictionary"/suggestion area does nora need to select when she wants to fix an error? add to dictionary ignore once ignore all one of the suggested words

Answers

Answer:

ignore all one of the suggested words

Answer:  D: one of the suggested words

Explanation:mines from enginuity and this is what it said hope it helps:)

One hint that you might be dealing with a phishing site is: a) Hidden address bar b) Fake address bar c) Misspelled text d) All the above

Answers

One hint that you might be dealing with a phishing website is: D. all the above.

What is phishing?

Phishing can be defined as a type of social engineering (cyberattack) which involves making an attempt to obtain sensitive user information, especially by disguising as a trustworthy entity in an electronic communication, which is usually over the Internet.

This ultimately implies that, some of the hints that an end user might be dealing with a phishing website include the following:

Hidden address bar.Fake address bar.Misspelled text

Read more on phishing here: https://brainly.com/question/23850673

#SPJ1

Mille gets a text from her friend asking if she wants to come over. It seems like a bit of a hassle to go to her friend's house, especially when they
could watch online videos together and talk over the phone. What is the BEST advice for Millie?
OA. Her friend will probably be relieved If she does not come over.
OB. They should just say whatever they want to say to each other over social media.
OC. It will be a more positive experience if she spends time with her friend in person.
OD. If they are doing the same activities virtually as they would if they were together, it does not make much difference.

Answers

Answer:

OC. It will be a more positive experience if she spends time with her friend in person.

Explanation:

You should always spend time with people in person rather than online whenever you get the chance.

What is a border line

Answers

Answer:

a border line is what separates to places from one another like if i were to go to mexico i would have to cross the border

Explanation:

Depends on context.

- Could be a line marking a border

- Barely acceptable; borderline

Example:

She was a borderline candidate.  

This means that she barely made it as a candidate role.

Other Questions
Which nucleus completes the following equation?212 86 Rn-> 4 2 He+? What did the members of nato pledge to do if any member nation was attacked? accept refugees from the nation that had been attacked respond as if they themselves had been attacked ask the united nations for help allow soviet expansion and influence to grow A down payment is:Oa) The monthly payment you make towards your mortgage.Ob) Part of your closing costs.c)The initial sum of money that you pay toward your house.A homeowner's final mortgage payment.d)Submit A map shows that the vertices of a backyard are $W\left(-100,-70\right),\ X\left(-100,0\right),\ Y\left(0,0\right),$ and $Z\left(-60,-70\right)$ . The coordinates are measured in feet. The line segment $XZ$ separates the backyard into a lawn and a garden. The area of the lawn is greater than the area of the garden. How many times larger is the lawn than the garden? Perform the followingmathematical operation, andreport the answer to thecorrect number of significantfigures.0.97584/5.68 = [?] Area of prisim Calculating the relative frequencies from the data given in the table. choose all that correctly describe an association between favorite subject and grade. a higher percentage of 8th graders than 7th graders prefer history. a higher percentage of 7th graders than 8th graders prefer english. a higher percentage of 8th graders than 7th graders prefer math/science. Write a short yearbook story 1. philosophy (intro to logic measure your understanding of the 4 new rules of inference for predicate logic (pl): universal instantiation (ui), external instantiation (ei), existential generalization (eg), and universal generalization (ug) and one new rule of replacement: quantifier negation (qn) required for demonstrating that arguments of predicate language (pl) are valid. question: is the following statement true or false? An IT professional has access to many confidential records through her username and password. She makes sure to change her password frequently to protect this private information. In this scenario, choose the types of ethical behavior being demonstrated. Check all of the boxes that apply.Do no harm to a company when leaving.Protect passwords and system access of users.Be fair and honest with customers.Protect sensitive information. According to Newton's second law of motion, a larger force acting on an object causes a greater(..................................) of that object Help. Please and thanks. Please help will give brainliest!!!! Hello! I need to write a story, but I do not have a creative idea for the story. I wrote the first paragraph of the story, so please continue the story that I began. Please and thank you! Moreover, there is a requirement that we need to follow, so please check the requirement too! *I will use this as a resource and change it in my own word, so please continue the story with a creative idea! Please help!*This is the story that I wrote, and please continue:It was a peaceful Friday evening. Hara's best friend Victoria came to Hara's house at 7 pm. We were playing, but the leaves were slowly falling, the sun was setting, and we quietly began to hear the wind. Hara and Victoria were sitting near the fireplace, reading a book. Hara and Victoria were just about to finish the second and last page of the book when they suddenly heard a noise. Suddenly, the light went off and on, and then I got goosebumps all over my body. It sounded like crackle electricity, and it turned off before we could even guess what it was. Ceiling lights, air conditioning, and TV. His fireplace was Electric, so it went out too. It was pitch-black darkness everywhere. On a dark autumn night, the electricity in my house just went out... Your story should include all of the following:Creation of a mysterious, ominous settingUse of short sentences and quick dialogueInclusion of mysterious charactersInclusion of mysterious objectsHighlight your story according to the key belowA minimum of four paragraphs in lengthBe sure to highlight each of the writing techniques in your story as follows: All techniques that relate to the setting should be highlighted in pink All techniques that relate to pacing, use of short sentences, and quick dialogue should be highlighted in blue All techniques that relate to mysterious characters or objects should be highlighted in yellowNote: If you cannot highlight, then type "setting," "pacing," and "mysterious characters/objects" in parentheses-next to your descriptions. is when a power that the federal government possessed is returned to the state. The setting of The Golden Trioped 4. How did industrialization encourage the growth of public education? (1 pc 0 by increasing the demand for literate workers O by organizing workers into cooperatives and unions O by providing more jobs for children O by relocating families in company towns In the 1960s, migrant farm workers, who traveled to the U.S. for seasonal work, labored under horrible conditions. They were paid low wages, had no access to toilets in the fields where they worked, and lived in unheated shacks. How could farm laborers with no voice combat this problem Write 6 41 100 as a decimal number. Where does claudine have to go? a bookstore, a toystore and supermarket a bakery, a butchery and a market a petstore, a bank and a bakery a supermarket, a cheesestore and a toystore