if you leave your study place in the library and leave your laptop open, or some indication that the space is being used, you are probably making use of:

Answers

Answer 1

If you leave your study place in the library and leave your laptop open, or some indication that the space is being used, you are probably making use of: a territorial marker.

What is library?

A library is a collection of resources, books, or media that are available for use rather than merely display. A library is a physical venue or a virtual area that provides physical (hard copies) or digital access (soft copies) to materials. A library's collection may comprise printed materials and other physical resources in a variety of media such as DVD, CD, and cassette, as well as access to information, music, or other content stored in bibliographic databases.

To learn more about library

https://brainly.com/question/27888406

#SPJ4


Related Questions

why does the maximum packet lifetime have to be large enough to ensure that not only the packet but also its acknowledgments have disappeared? give one potential disadvantage when nagle's algorithm is used on a badly congested network

Answers

Since duplicate packets could result.

Why does the maximum packet lifetime have to be large?

In order to guarantee that the packets and their ACK are both received before being discarded. Whenever the packet is received but no ACK is received. Duplicate packets could result.

What is the potential disadvantage when Nagle's algorithm is used on a badly congested network?

It leads to an increase in delay, which slows down an application that needs a quick network response.

Nagle's algorithm:

Nagle's algorithm makes the stack wait until every piece of data on a connection has been acknowledged before sending more data. By reducing the number of packets that must be sent, this technique, known as "nagling," improves the efficiency of a network application system.

Thus duplicate packet results out if the maximum packet lifetime has to be large.

https://brainly.com/question/28498592

#SPJ4

ow many 2-to-4 decoders are necessary to create a 4-to-16 decoder?b.how many 3-to-8 decoders are necessary to create a 6-to-64 decoder?c.how many 1-bit 2-to-1 muxesare necessary to create a 1-bit 8-to-1 mux?d.how many 1-bit 2-to-1 muxes are necessary to create an 8-bit 2-to-1 m

Answers

You will want 16 (4 x 16) decoders to match the 256 outputs. In other words, you will need 16 times 4 inputs, or 64, but you only have 8 inputs available.

A combinational circuit made of logic gates is a decoder. It is the encoder's opposite. A set of digital input signals is converted into an equivalent decimal code of the output by a decoder circuit. A decoder produces 2n outputs for every 'n' inputs. In this article, we'll talk about designing a circuit for a 4 to 16 decoder utilizing a 3 to 8 decoder.

A combinational circuit known as an encoder converts a group of signals into a code. An encoder circuit produces "n" outputs for "2n" inputs.

By combining two or more lesser combinational circuits, a decoder circuit of the higher combination is created. Two 3 to 8 decoder circuits or three 2 to 4 decoder circuits can be used to create a 4 to 16 decoder circuit.

The enable pin serves as both decoders' input when two 3 to 8 Decoder circuits are coupled. A 3 to 8 decoder circuit's enable pin is low when another 3 to 8 decoder circuit's enable pin is high.

To know more about decoder click on the link:

https://brainly.com/question/20493746

#SPJ4

bob has bought a dvd and a dvd player. he owns both and has complete physical access, inside and out, to the disk and player. does bob have unrestricted access to everything the hardware and software contains?

Answers

No, Bob does not have unrestricted access to everything on the hardware and software. While he has complete physical access to the disk and player, there may be certain files or folders that he is not able to access depending on the permissions that have been set.

What is disk?

A disk (or diskette) is a flat, spherical plate that can be used to encode and store data. Hard discs are a common component of a computer's storage system, although most other types of disk technology (floppy discs, CD-ROMs, and so on) have become obsolete. Data access from a drive is slower than data access from main memory, but disks are significantly cheaper. Disks, unlike RAM, retain data even after the computer is switched off. As a result, while disks have historically been the preferred storage medium for most types of data, they are gradually being supplanted by newer forms of storage such as flash drives, solid state drives, and cloud storage.

To learn more about disk

https://brainly.com/question/27852644

#SPJ4

Select the correct answer from each drop-down menu. Ali receives an email from a person posing as a bank agent, who asks Ali to share his bank account credentials. Which type of network attack does this scenario indicate? The network attack in this scenario is This attack can occur​

Answers

Ali receives an email from a person posing as a bank agent, who asks Ali to share his bank account credentials. The type of network attack this scenario indicates is a Phishing attack.

What is a Phishing Attack?

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive information to the attacker or to install harmful software, such as ransomware, on the victim's infrastructure.

The following are examples of Phishing attacks:

Phishing using a spear.Whaling.Vishing.Phishing through email

Phishing (pronounced "fishing") is an assault that tries to steal your money or identity by tricking you into disclosing personal information – such as credit card numbers, bank account information, or passwords – on websites that appear to be legitimate.

Learn more about Phishing Attacks:
https://brainly.com/question/28170596
#SPJ1

you are developing an app for a company. devices that access the app must be enrolled in microsoft intune. the app must not require additional code for conditional access. you need to select an app type. which app type should you use?

Answers

Microsoft Intune App Type should be used.

What is app?
A computer programme or software application that is made specifically to run on a mobile device, such as a phone, tablet, and watch, is known as a mobile application or app. Via contrast to desktop applications, which are created to operate on desktop computers, or web applications, which run as mobile web browsers instead of directly on the mobile device, mobile applications are frequently intended to run on mobile devices. The public demand for apps caused a rapid expansion into other fields such as mobile games, industrial automation, GPS as well as location-based services, order-tracking, as well as ticket purchases, leading to the availability of millions of apps today. Apps were initially intended for productivity assistance including such email, calendar, and contact databases. Internet access is required for many apps.

To learn more about app
https://brainly.com/question/26320301
#SPJ13

Recently a family from virginia received the keys to their new 3d printed home. The 3d printer that manufactured this home is primarily a ________ innovation.

Answers

The 3d printer that manufactured this home is primarily a technologically enabled innovation.

A technical innovation with the potential to upend the industrial industry is 3D printing, or more generally additive manufacturing. Spools of plastic filament or trays of resin are turned into tangible items using 3D printing. Literally out of this world is 3D printing.

On the International Space Station, where NASA keeps a 3D printer, astronauts may create unique items (like this maintenance wrench) without needing to launch them into space.

Students, business owners, hobbyists, and large factories all use 3D printing. There are many applications for 3D printer since technology makes it possible to turn a digital design into a real-world object.

To know more about 3D printer click on the link:

https://brainly.com/question/28137535

#SPJ4

Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________ system.

Answers

Users in motion, wireless connectivity, and a cloud-based resource are the elements in a Mobile system.

What is wireless?
The transport of data between two or more sites without the use of a electrical conductor, optical fibre, or other continuous directed medium is known as wireless technology (or just wireless, depending on the situation). Radio waves are used in the most popular wireless technologies. As little as a few metres for Bluetooth or as far as millions of kilometres for deep-space radio communications are possible with radio waves. It includes a variety of fixed, portable, and portable applications such as wireless networking, two-way radios, cellular phones, and personal digital assistants (PDAs). GPS devices, garage openers, wireless computer mice, keyboards, and headsets, earphones, radio receivers, satellite tv, broadcast television, and cordless telephones are more examples of applications for radio wireless technology.

To learn more about wireless
https://brainly.com/question/25633298
#SPJ4

each of the vms on your host computer is configured to use the nat networking type. they can still pick up e-mail and surf the web. how are they getting their ip addresses?

Answers

The VMS are getting their IP addresses from the host computer.

What is VMS?
An Internet-enabled, frequently Web-based application called a vendor management system (VMS) serves as a tool for businesses to manage and procure staffing services, including temporary and, in certain cases, permanent placement services, as well as outside contract or contingent labour. Order distribution, integrated billing, and much improved reporting capabilities that exceed manual systems and processes are typical aspects of a VMS solution. Vendor management in the financial sector requires consistent risk classification and attention to control third-party risk due to recent laws. To conform to the terminology used by the regulatory bodies, a number of institutions have reclassified or renamed their programmes to Third Party Risk Management (TPRM).

To learn more about VMS
https://brainly.com/question/28864877
#SPJ4

Why is it important to set up and monitor direct messaging notifications? question 2 options: so you can be sure you're using the right channel. so you don't miss any important messages. so you never have to check your email. so you are never on mute.

Answers

Regardless of the size of your company, push notification marketing can help you start attracting recurring visitors to your website.

What is the purpose of the notification message?

An Android notification is a message that appears outside of your app's user interface to tell the user of reminders, messages from other users, or other pertinent information from your app. Users can tap the notice to launch your app or perform an action right there.

Direct notification is communication through phone or in-person between a division inspector and/or field office employees and a well owner, owner holding a permit, or their authorized representative.

Using push notifications, you can execute engagement campaigns, boost sales, and get more repeat visitors to your website. Regardless of the size of your company, push notification marketing can help you start attracting recurring visitors to your website.

To learn more about notifications refer to:

https://brainly.com/question/28771351

#SPJ4

which component is designed to let you use a notebook system as a desktop system by making it possible to connect a normal-sized external mouse, keyboard, monitor, and speakers?

Answers

You may utilise notebook computers as desktop computers by docking them. You can use a standard-sized external mouse, keyboard, monitor, and speakers by plugging them into the docking station's specific connectors, which are connected to the notebook's rear.

What is desktop?
By docking laptops, you can use them as desktop computers. By connecting them to the precise connectors found on the docking station, which are attached to the back of the notebook, you can utilise an external mouse, keyboard, monitor, and speakers that are of standard size. The most prevalent form of computers were minicomputers, which, despite their name, were fairly large and were "mini" just compared to the so-called "big iron." Before the widespread adoption of microprocessors, a computer that fit on a desk was thought to be astonishingly little. The first computers, and later the all-purpose, high-throughput "mainframes," occupied an entire room.

To learn more about desktop
https://brainly.com/question/7221406
#SPJ13

In order to keep track of all conditional formatting used in a worksheet, we use the ___________ menu command under conditional formatting.

Answers

In order to keep track of all conditional formatting used in a worksheet, we use the manage rules menu command under conditional formatting.

What is meant by conditional formatting?

Your data's patterns and trends may become more obvious with the aid of conditional formatting. For example, the following monthly temperature data has cell colors associated with cell values. To use it, you construct rules that define the format of cells based on their values.

With the aid of the conditional formatting (CF) tool, you may use formatting to a cell or range of cells and contain it alter related on the contents of the cell or the result of a formula.

We utilize the manage rules menu command under conditional formatting to keep track of all conditional formatting applied to a worksheet.

To learn more about conditional formatting refer to:

https://brainly.com/question/27897515

#SPJ4

Answer:

In order to keep track of all conditional formatting used in a worksheet, we use the manage rules menu command under conditional formatting.

Explanation:

Conditional formatting can help make patterns and trends in your data more apparent.

What is the use of conditional formatting?

Conditional formatting makes it easy to highlight certain values or make particular cells easy to identify. This changes the appearance of a cell range based on a condition (or criteria). You can use conditional formatting to highlight cells that contain values that meet a certain condition. To use it, you create rules that determine the format of cells based on their values, such as the following monthly temperature data with cell colors tied to cell values. They are grouped into three categories: Data Bars are horizontal bars added to each cell, much like a bar graph. Color Scales change the color of each cell based on its value. Each color scale uses a two- or three-color gradient. Conditional formatting hence enables you to apply special formatting to cells in your spreadsheet that meet certain criteria.

To learn more about conditional formatting, refer:

https://brainly.com/question/16014701

#SPJ4

how can you protect personal information gathered by legitimate organizations? a. sign up for many online mailing lists. b. use the same password and username for all your online accounts. c. create a separate email account for receiving information from websites. d. link your credit or debit card to your online accounts.

Answers

We can protect personal information gathered by legitimate organizations - Create a separate email account for receiving information from websites.

What is personal information?
Any information pertaining to an identifiable individual is considered personal information, often known as private details or personally identifiable. PII is a commonly used acronym in the US, although the term it stands in for has four different frequent variations based on the words personal, personally, identifiable, and identifying. Not all meanings are equal, and depending on the context and the jurisdiction in which a phrase is used, several definitions may be beneficial for legal purposes. The word "personal information" has a far broader definition under European and other data security regimes, which are principally based on the General Data Protection Regulation. (GDPR), and it determines the extent of the regulatory framework.

Therefore, the correct option is C
To learn more about personal information
https://brainly.com/question/24621985
#SPJ4

use the drop-down menus to correctly complete these sentences about how variables can be defined. are single numbers or values, which may include integers, floating-point decimals, or strings of characters. a(n) is a group of scalar or individual values that are stored in one entity. a(n) is a data type that is assigned a true or false value by a programmer. a(n) is a data type that can be assigned multiple values.

Answers

Single numbers or values are known as scalars, and they can take the form of character strings, integers, or floating-point decimals.

Single numbers or values are known as scalars, and they can take the form of character strings, integers, or floating-point decimals.

An array is a collection of scalar or distinct values that are kept in a single object.

A data type that has been given a true or false value by a programmer is known as a user-defined type.

A data type with numerous values is called an abstract data type.

scalar, a physical quantity whose magnitude serves as its sole description. Volume, density, speed, energy, mass, and time are a few examples of scalars. Other quantities, like as force and velocity, are referred to as vectors since they have both magnitude and direction.

Real numbers that are typically positive but not always characterize scalars. When a particle moves in the opposite direction from the direction in which a force is acting, as happens when frictional force slows down a moving body, for instance, the work done on the particle by the force is a negative quantity. The standard algebraic principles can be used to modify scalars.

To know more about scalars click on the link:

https://brainly.com/question/21925479

#SPJ4

a star topology is: group of answer choices difficult to manage because the central computer receives and routes all messages in the network dependent upon the capacity of the central computer for its performance always slower than a ring network less susceptible to traffic problems than other architectures not affected if the central computer fails

Answers

A star topology is dependent upon the capacity of the central computer for its performance. So the right answer to this question is B.

The star topology can be defined as a network topology in which each network component is physically connected to a central node such as a router, hub, or switch. In a star topology, the central hub acts like a server and the connecting nodes act like clients. The star topology has a function to reduce the impact of a transmission line failure by independently connecting each host to the hub.

You can learn more about The star topology at https://brainly.com/question/13186238

#SPJ4

What is psychological dependence

Answers

a. the body can function normally but the brain craves the drug

2 Explain:How is computer science helping this
scientist do her research?

Answers

Researchers in computer science and information technology develop new technologies, as well as novel applications for old ones. They research and address challenging computing issues for a variety of applications in industry, science, and medical.

Why will computer science matter in the future?

Future prospects for computer science are bright. A career in just this area will provide access to several job prospects. Web developer, cybersecurity professional, database administrator, software developer, and more are just a few of the numerous occupations available in this industry.

What does computer science primarily aim to achieve?

Improve your ability to solve problems To address issues, exercise logical, computational, and creative thought. Create an algorithm for the solution after identifying and analyzing the issue. The algorithm should be a methodical technique to process the input data to create the desired output.

To know more about Computer Science visit:

https://brainly.com/question/13609051

#SPJ10

the term memory refers to data storage that is accessed
a) long term
b) short term
c) medium term
d) no term

Answers

Answer:

b: short term

Explanation:

A hard drive or solid state drive stores long-term data. RAM (Random access memory) is like an extremely fast HDD/SSD that temporarily stores a small amount of data that the CPU needs immediate access to.

You can think of this sort of like baking. When you are baking, you have a limited amount of space on the counter where you can immediately use items you place on it. This space on your counter would be like your RAM. Then you have your fridge. Your fridge is where you can place lots of items for longer periods of time that you don't need immediate access to. The fridge would be like your HDD/SSD.

you are the administrator for your organization, which has started using containers. you need to create and modify a stack. what command would you use?

Answers

Docker build is the command used

What is Docker build?

Using a Dockerfile and a "context," the docker build command creates Docker images. The collection of files present in the PATH or URL given is referred to as the build context. Any file in the context may be mentioned in relation to the build process. A COPY instruction, for instance, can be used in your build to reference a file in the context.

Docker stack command:

In addition to managing the orchestration of numerous containers across various machines, Docker Stack is a layer above Docker containers. A Docker Swarm is a collection of machines running the Docker daemon that are grouped together to share resources, and it is used to run Docker Stack.

Hence using the docker build and docker stack commands we can modify a stack

To know more on docker please follow the link:

https://brainly.com/question/20491139

#SPJ4

host a and b are communicating over a tcp connection, and host b has already received from a all bytes up through byte 126. suppose host a then sends two segments to host b back-to-back. the first and second segments contain 80 and 40 bytes of data, respectively. in the first segment, the sequence number is 127. host b sends an acknowledgment whenever it receives a segment from host a. in the second segment sent from host a to b, what is the sequence number?

Answers

Answer:

sequence number = 207

source port number = 302

destination port number = 80

Explanation:

which is the advantage of encapsulation? question 30 options: only public methods are needed. making the class final causes no consequential changes to other code. it enables changes to the implementation without changing a class's contract and causes no consequential changes to other code. it enables changes to a class's contract without changing the implementation and causes no consequential changes to other code.

Answers

The advantage of encapsulation is it enables changes to implementation without changing a class's contract and causes no consequential changes to other code.

The definition of encapsulation is the grouping of data into a single unit. It is the mechanism that connects the data the code manipulates with the code itself. Encapsulation can also be viewed as a barrier that stops code from the outside of the barrier from accessing the data.

Technically speaking, encapsulation means that a class's variables or data are concealed from all other classes and are only accessible through member functions of the class in which they are stated.

It is also known as a combination of data-hiding and abstraction because, similar to encapsulation, the data in a class is hidden from other classes using the data hiding concept, which is accomplished by making the members or methods of a class private, and the class is exposed to the end-user or the world without providing any details behind implementation.

Encapsulation can be accomplished by writing public methods in the class to set and get the values of variables and declaring all of the class's variables as private. With the setter and getter methods, it is more clearly described.

To know more about encapsulation click on the link:

https://brainly.com/question/13147634

#SPJ4

if you plan on diagnosing a problem by searching technical forums or other internet resources, what information should you provide if you are getting an error message?

Answers

If you are getting an error message, you should provide the message text, the software or system you are using, and any other relevant information.

What is error message?
When an unexpected issue arises, information is shown in the form of an error message, typically on a computer or other device. Error messages are frequently shown using dialogue boxes on contemporary operating systems with graphical user interfaces. When a user action is necessary, to show that a desired operation has failed, or to communicate significant cautions, error messages are employed. Error messages are a common sight in computing and are included in every operating system and piece of hardware. An important problem in usability and other areas of human-computer interaction is proper error message design. When an unexpected event occurs, an operating system or application will notify the user with an error message. Error messages are often presented by the operating system or programme with the use of dialogue boxes.

To learn more about error message
https://brainly.com/question/12978311
#SPJ4

after having downloaded and installed pfblockerng for your pfsense firewall, you are configuring what sites to block. how do you block lists of websites you don't want the employees to access?

Answers

The steps that you may comply with to block lists of websites you do not need the employees to access are:

Create a written limited Internet use insurance for employees.Refuse to permit the Internet to get proper access to employees who do now no longer require it.Place passwords on laptop structures that get proper access to the Internet.Install software that controls Internet usage.

One way to block users from having the capability to overtake your net internet site online is to restrict their IP addresses. Based on your dialogue board or commenting host, like WordPress or Disqus, you may be able to locate the IP address of a purchaser from the admin dashboard or server logs.

You can learn more about The steps to block list of website at https://brainly.com/question/24129952

#SPJ4

which of the following statements is true about a vpn? group of answer choices a vpn client software encrypts messages to ensure secure transmissions. a vpn network does not provide users with remote access. a vpn connection utilizes private networks instead of the public network. a vpn connection appears as a secure connection, though it is not. a vpn is only used between hosts on local networks.

Answers

The statement that is true about VPN is: a VPN client software encrypts messages to ensure secure transmissions.

In the field of computer science, a VPN can be described as a network that allows a secured connection when a public connection is being used. A VPN helps to protect the privacy of a user and establishes secure transmissions.

Encryption is formed for the protection of data through a VPN. Secure transmissions are established by a VPN by hiding the IP address of a network through the VPN.

As a result of a VPN, you can use public networks such as a public wi-fi without any risk an VPN will ensure a secure transmisison.

To learn more about VPN, click here:

https://brainly.com/question/28110742

#SPJ4

Describe how to create a list with bullets

Answers

If on docs or a similar writing app, there should be a button with a block dot and lines that when clicked will allow you to make a bullet list
If on paper, just draw a black dot and write each point you want to make on a separate dot.

uppose that a tcp segment has a lifetime of 2 minutes in the network. calculate the maximum transmission speed (bits/second) at which a host can send out 1460-byte tcp segments so that there will not be two tcp segments from the same sender with the same sequence number in the network, i.e., without having the tcp sequence numbers wrap around?

Answers

The maximum transmission speed at which a host can send out 1460-bytes TCP segments from the same sender with the same sequence number in the network exists at 10 bits per second.

How to estimate the sustained maximum data transfer rate?

If the bandwidth exists at 10 Gbps, the link will be (10/8) 109 bps = 1.25 109 bps.

120 seconds is the maximum segment lifetime.

The amount of data transferred in 120 seconds exists equivalent to 150 1.25 109 bps / 120. 1.5 x 1010 bytes Equals 109 bytes

The TCP will generate a 1.5 1010 sequence number in the 120 seconds.

One is required to transfer data at the highest speed to make a 1.5 × 1010 unique sequence.

= ceiling(log(1.5 1010)

= ceil(log(1.5) + log(1010))

= ceil(0.1761 + 10)

= ceil(10.1761) (10.1761)

= 10 bits in the field for the sequence number.

Therefore, a sustained maximum data transfer rate of 10 bits per second exists required between two hosts.

To learn more about bytes refer to:

brainly.com/question/2280218

#SPJ4

The sun has been up for several hours, and it has been shining on these trees.
What can the trees do because they are in sunlight? What does this mean for the number of energy storage molecules in the trees?
The trees can . . .

A. give off carbon to the air. Giving off carbon allows them to make energy storage molecules.

B. give off carbon to the air. Giving off carbon uses up energy storage molecules.

C. take in carbon from the air. The carbon is used to make energy storage molecules.

D. take in carbon from the air. The carbon is used to break down energy storage molecules.

Answers

For some hours now, the light has been beaming on these trees. Because they are in sunlight, The trees can "take in carbon from the air. The carbon is used to make energy storage molecules." (Option C).

What is the above process called?

The above process is called Photosynthesis. Photosynthesis is the process through which plants convert sunlight, water, and carbon dioxide into oxygen and sugar energy.

Photosynthesis is the process through which plants and other organisms convert light energy into chemical energy, which is subsequently released to fuel the organism's activities through cellular respiration.

Photosynthesis has the following characteristics: It is a process that happens only in plants that have the green pigment chlorophyll, which is utilized to manufacture food. Sunlight, water, and oxygen are required, and two processes occur, one light-dependent and one light-independent.

Learn more about trees:
https://brainly.com/question/11076581

#SPJ1

after marge turned on her computer, she saw a message indicating that some of her files were remotely encrypted, and she needs to provide a bitcoin payment for the de-encryption key, . what does this indicate?

Answers

The message indicates that the computer has been infected with ransomware, and the files have been encrypted. The attacker is demanding a payment in Bitcoin in order to provide the decryption key.

What is bitcoin?

Bitcoin is a peer-to-peer digital currency that may be transmitted via the bitcoin network. Bitcoin transactions are cryptographically verified by network nodes and recorded in a public distributed ledger known as a blockchain. The cryptocurrency was created in 2008 by an unknown individual or group of individuals using the alias Satoshi Nakamoto. On October 31, 2008, a white paper defining the name bitcoin was published. It's a mash-up of the phrases bit and coin.

To learn more about bitcoin
https://brainly.com/question/28032977

#SPJ4

the hacker is now attempting to gain unauthorized access to a public-facing web application by using the stolen credentials one by one. what type of attack is taking place

Answers

The hacker is attempting a brute force attack.

What is hacker?

A hacker is an information technology expert who employs non-standard methods to attain a goal or overcome an impediment within a computerised system. Though the term "hacker" has come to be associated with a security hacker - someone who uses technical knowledge of faults or exploits to break into computer systems and access data that would otherwise be inaccessible to them - hacking can also be used by lawful figures in legal situations. Hacking and cyber-attacks, on the other hand, are used extra-legally and criminally by law enforcement and security services (performing warrantless activities), and are used as a weapon of both legal and illegal warfare by state actors.

To learn more about hacker

https://brainly.com/question/14366812

#SPJ4

a user complains that he cannot access a particular web site, although he is able to access other web sites. at which layer of the osi model should you begin troubleshooting the problem?

Answers

The layer of the OSI version that must start troubleshooting the problem is layer 1.

The Open Systems Interconnection version may be defined as a conceptual version that resources a not unusualplace foundation for the coordination of [ISO] requirements improvement for structures interconnection. The Physical layer of the OSI version way accountable for the switch of bits — the 1's and 0's which make up all pc code. This layer plays the bodily medium this is wearing the site visitors among nodes. An instance could be your Ethernet cable or Serial Cable.

Learn more about The OSI at https://brainly.com/question/14433133

#SPJ4

scanning an item at a computerized checkout station in a supermarket is an example of​

Answers

Answer:

input

Explanation:

Other Questions
A line has a slope of 1 and includes the points (9,2) and (8,p). What is the value of p? Part A. 150% of what number is 156 Part B. 4.4 is 5.5% of what number Fabric Sale At a fabric store, fabrics are sold by the yard. A dressmaker spent $46 on 5 yards of silk and cotton fabrics for a dress. 1 x + y = 5 117x + 4y = 46) Silk is $17 per yard and cotton is $4 per yard. Here is a system of equations that represent the constraints in the situation. What does the solution to the system represent? URGENT!! ILL GIVEBRAINLIEST! AND 100 POINTS!!!!!!!! simplify 3^53^4.a. 320b. 3^9c. 6^9d. 3^20I think its b but I am unsure. On february 13, 2016, following the death of supreme court justice antonin scalia, senate majority leader mitch mcconnell issued a statement that the supreme court vacancy should be left to the next president of the united states, who would be elected that november. Nonetheless, president obama nominated circuit judge merrick garland to fill the vacancy. The senate judiciary committee never held a hearing nor was a vote scheduled on the nomination. The scenario demonstrates that. Is this relation a function? Justify your answer.A. Yes because every x- and y-value is positive.B. No because two points with the same y-value have different x-values.C. No because two points with the same x-value have different y-values.D. Yes because the number of x-values is the same as the number of y-values Help asap1. In which organs is food moved through by peristalsis? (Choose all that apply)A.stomachB.small intestineC.esophagusD.liver2. What is the substance produced by the liver that is necessary to break down fat drops into smaller fat drops?A.bileB.enzymeC.acidD.mucus allie's only source of income for the year is wages from a part-time job of $9,000. she is not married and has one dependent child. allie has no tax liability and she had no income tax withheld by her employer. what is the amount of allie's earned income credit? Predict the products for each of the following reactions. Write the molecular equation, the complete ionic equation, and the net ionic equation. Classify the reactions in as many ways as you can.Aqueous sulfuric acid is added to aqueous potassium hydroxide. The table shows pizza prices at Papi's Pizzeria. Pizza Size Pricesmall $9.99medium $11.99large $13.99On Saturday, Papi's sold 39 small pizzas, 62 medium pizzas, and 83 large pizzas.Which equation represents the total amount of money Papi's made selling pizzas on Saturday? A. (39+62+83)($9.99+$11.99+$13.99)=$6,618.48 B. ($9.9939)+($11.9962)+($13.9983)=$2,294.16 C. (396283)($9.99+$11.99+$13.99)=$5,579.48 D. 13($9.99+$11.99+$13.99)(39+62+83)=$2,206.16 During which of the following decades in American history was the crime raterelatively stable?The 1950sThe 1960sThe 1970sThe 1980s can someone help me please!!!!!!! 10) f(x) = x5 - 10x4 + 42x3 -124 x2 + 297x - 306; zero: 3i ? A) 2, -3i, -4 - i, -4 + i C) 2, -3i, 4 - i, 4 + i B) -2, -3i, -4 -i, -4 + i D) -2, -3i, 4-i, 4 + i Very few would argue with the claim that the President's role as Commander-in-Chief is the greatest formal power that a president possesses. Yet, in the Constitution, only Congress has the authority to formally "declare war." Presidents for the last 60-70 years have openly stated that they do not need Congressional authorization to use the military to pursue America's interests on the global stage. As proof, America has not formally declared war since WWII. So, Korea, Vietnam, Gulf War, Iraq War, Afghanistan, and now Syria have all been military exercises, but not wars in the Constitutional sense. Please help ASAP!Locate a brief passage that develops the relationship between the setting and the character in The Handmaid's Tale. Provide the context of the passage and describe the relationship being developed or portrayed and explain its possible function, using evidence and commentary to support your interpretation. mark has decided to start a business! his dream is finally coming true. as mark explores the world of business formation he takes into account a few things: 1. he has enough money to start the business 2. he doesn't like complicated paperwork and having to hold annual meetings 3. the business he is starting is low risk 4. he doesn't plan on hiring any employees 5. he is not worried about making any profit for the first few years. based on this information, what type of business would be best for mark to form? You need 30 ounces of chocolate chips to bake some cooldes. You already have 8 ounces of chocolate chips at home. Write an inequality that could beused to find how many ounces of chocolate chips you need to buy.whats the inequality: noticing that their baby daughter seems to love singing and dancing, her nonmusical parents stream music into the house constantly and purchase a piano and child-sized guitar. this is an example of . an adult client reports to the emergency department with shortness of breath. which additional clinical finding(s) leads the health care provider to suspect the client has a moderate-sized pulmonary embolism? select all that apply.