What is computer Network?​

Answers

Answer 1

Answer:

[tex]\boxed{\sf {view \: explanation}}[/tex]

Explanation:

A computer network is a network of computers that can share data among the computers.


Related Questions

All of the following statements about MapReduce are true EXCEPT: MapReduce handles the complexities of network communication. MapReduce is a general-purpose execution engine. MapReduce handles parallel programming. MapReduce runs without fault tolerance.

Answers

Answer:

The correct option is;

MapReduce runs without fault tolerance

Explanation:

Map Reduce is a technique of processing or a framework of software, that is geared towards managing, sorting and handling large data by working in the Map and Reduce phases where the map function involves the dividing, filtering and sorting of the data and mapping of the split data while the reduce method involves the rearranging, summary activities having the data reduced.

1) To point the lens of a camera up or down is called:
A) Arc
B)Dolly
C)Pan
D)tilt

Answers

Answer:

D)

Explanation:

Tilting is a cinematographic technique in which the camera stays in a fixed position but rotates up/down in a vertical plane.[1] Tilting the camera results in a motion similar to someone raising or lowering their head to look up or down. It is distinguished from panning in which the camera is horizontally pivoted left or right. Pan and tilt can be used simultaneously.[2] In some situations the lens itself may be tilted with respect to the fixed camera body in order to generate greater depth of focus. [3][4]

The camera's tilt will change the position of the horizon, changing the amount of sky or ground that is seen.[5] Tilt downward is usually required for a high-angle shot and bird's-eye view while a tilt upward is for a low-angle shot and worm's-eye view. The vertical offset between subjects can reflect differences in power, with superior being above.

How would you define a cloud today?
as a non-factor
networking
server
any remote virtualized computing infrastructure

Answers

Answer:

The answer is "any remote virtualized computing infrastructure".

Explanation:

The term cloud is used as the symbol of the internet because cloud computing is some kind of internet computing, that offers various services for computers and phones in organizations via the internet.  

The virtual network allows users to share numerous system resources throughout the network system.It allows you to access the optimal productivity by sharing the resources of a single physical computer on many virtual servers.

Question 1 : Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

Answers

Answer:

The answer is "TLS and the DBMS".

Explanation:

In given- question there are two questions were included, which can be defined as follows:

The term, Transportation Layer Security is used as "TLS", that is an SSL security protocol that allows other security procedures should be used. It is an upgraded version of SSL, that works in very much the same way of  SSL, and by encrypting information and data transfer.

The DBMS is used to store, access and handle data like layout or domain name and record and file structure of the database, it meets in the business requirements, consumers can create their respective databases including DBMS.

Which decimal value (base 10) is equal to the binary number 1012?

Answers

Answer:

The decimal value of 101₂² base 2 = 25 base 10

Explanation:

The number 101₂² in decimal value is found as follows;

101₂ × 101₂ = 101₂ + 0₂ + 10100₂

We note that in 101 + 10100 the resultant 2 in the hundred position will have to be converted to a zero while carrying over 1 to the thousand position to give;

101₂ + 0₂ + 10100₂ = 11001₂

Therefore;

101₂² =  11001₂

We now convert the result of the square of the base 2 number, 101², which is 11001₂ to base 10 as follows;

Therefore converting 11001₂ to base 10 gives;

11001₂= 1 × 2⁴ + 1 × 2³ + 0 × 2² + 0 × 2 ¹ + 1 × 2⁰

Which gives;

16 + 8 + 0 + 0 + 1 = 25₁₀.

The decimal value in base 10 that is equal to the binary number 101_2 is; 5

We want to convert 101_2 from binary to decimal.

To do this we will follow the procedure as follows;

(1 × 2²) + (0 × 2¹) + (1 × 2^(0))

>> (1 × 4) + (0 × 2) + (1 × 1)

>> 4 + 0 + 1

>> 5

In conclusion, the decimal value we got for the binary number 101_2 is 5

Read more about binary to decimal conversion at; https://brainly.com/question/17546250

Which of the following is considered information? a. A single keystroke b. All the characters on a keyboard c. An individual test score d. Average of a series of test scores

Answers

Answer:

The correct option is;

d. Average of a series of test scores

Explanation:

Information is defined as the knowledge or news which has been sent by one person and received by another such as the reply for a request for the current weather at a specific geographical location

Information is data that has been interpreted, processed, organised, put into a structured and presented within a given context that can be intelligible, meaningful and useful to people.

Question 13 (6.67 points)
Which of the following is NOT a benefit of a word processing application?
Provides automatic online backup
Offers professional document appearance
Allows easy sharing and collaboration
Saves time and increases efficiency

Answers

Answer:Offers professional document appearance

Explanation:

What are responsibilities of entrepreneurs? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders

Answers

to own businesses and to be responsible for employees

i will mark brainalist! ​

Answers

Answer:

I would say

1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

Answer:

i think it would be 1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

Explanation:

Chris needs to create a simple web page with HTML. Which tool will he use? HyperText Web browser Text editor Operating software WILL GIVE 100 AND BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!1

Answers

Answer:

The answer is "Text editor".

Explanation:

It is a computer program, which is used to provide editing on the plain text, and for this editing, we use a text editor. This tool differs from word processors software because it doesn't add additional text editing metals. In this tool, we also write the HTML code, and the incorrect choice can be defined as follows:

HyperText is a wrong choice because in these two or more pages are linked and it is used to move from one page to another. The Web browser is also a wrong choice because it is used to display the design of the web page. Operating software is also a wrong choice because it system software in which all things are done.  

Answer:

text editor

Explanation:

Does anyone know how I can fix this? I don’t know what is wrong. When I click retry it restarts my laptop and returns back to this. Please help!

Answers

Answer:

Software Program Reinstallation

Use the following steps to reinstall factory installed software programs:

Click Start (), All Programs, Recovery Manager, and then Recovery Manager again.

Figure : Recovery Manager

Recovery Manager main screen

Under I need help immediately, click Software Program Reinstallation.

On the Software Program Reinstallation welcome screen, click Next.

Look in the Factory installed programs list for the software program you want to reinstall.

If your software program is listed, select the title.

If the program you want to reinstall is not listed, select The program is not in the list, and then click Next. Follow the instructions to reinstall the program.

Figure : Select program to reinstall

Software Program Reinstallation window

Click Next.

If you are not prompted to uninstall the program before reinstalling it, continue to the next step.

If you are prompted to uninstall the program before reinstalling it, follow these steps.

Click Start (), and then Control Panel.

Under Programs, Uninstall a program.

The Uninstall or change a program window opens.

Figure : Uninstall or change a program

Uninstall or change a program screen

Select the program you want to remove.

Click Uninstall or Uninstall/Change at the top of the program list.

Read and respond to any messages that appear while the software is being removed from your computer.

Once the program is uninstalled, resume the reinstallation from the Recovery Manager program.

When the reinstallation is complete, select Yes, and then Finish to restart the computer.

Which function will add a grade to a student's list of grades in Python? add() append() print() sort()

Answers

Answer:

It will be add()

Answer:

A

Explanation:

In a response of approximately 50 words, explain why it would be essential for the successful A/V technician to participate in additional coursework, presentations and seminars offered by equipment manufacturers as well as annual conferences attended by colleagues in the industry.

Answers

Answer:

The A/V technician should participate in the additions coursework, seminars and presentations offered by the equipment manufacturers because it would give him more knowledge about the various products launched by the manufacturers, after the coursework it would be easier for him to repair the new range of products. It is important for the technicians to stay updated with the latest technical changes in the industry.

are the network administrator for your company. You are installing a new printer in the network. When you check the print server properties, it displays the following error: Server properties cannot be viewed. The print spooler service is not running. What should you do to resolve the issue using the least administrative effort

Answers

Answer:

Will have to run the net start spooler command.

Explanation:

The printer spooler seems to be accountable for overseeing incoming faxes that have been in effect intended for handling by the printer. Whether this device stops operating, your printer won't publish documentation as well as the machine may not notice it either.To solve these problems, you'll need to run the net start spooler command using the least administrative effort.

What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation of an organization, its information systems, and its facilities?

Answers

Answer:

security In-depth

Explanation:

The security in depth is a principle in which a sequence of safeguarding channels is used to secure the important data and information i.e valuation to the company. It also increased the security for a company as a whole

Therefore in the given situation, the  security In-depth required to layered the safeguarding channels to detect the infiltration

Hence, the  security In-depth is the correct answer

Here is the first line of a method declaration with some parts missing. public ________ scoreAnswer (studentAnswer ) Fill in the blanks in the method declaration using the following information: If scoreAnswer returns nothing and studentAnswer is a Paragraph object.

Answers

Answer:

void

Explanation:

The code snippet illustrates an object oriented programming (OOP)

From the question, the method name is scoreAnswer and it is not expected to return anything.

In OOP, when a method is expected to return nothing, the method is declared as void.

So, the blank will be replaced with the keyword void and the full statement is

public void scoreAnswer(studentAnswer)

Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output it produces. Which stage of the software development life cycle is Carlos ready for next? Coding Design Maintenance Testing

Answers

Answer:

Testing

Explanation:

From the question, we understand that Carlos just finished the coding of the app.

In software development life cycle, the coding phase is where Carlos is expected to make use of his choice of programming language to design the app;

This stage is an integral part of the implementation process and according to the question, the coding has been completed;

The next phase or stage after the implementation phase is testing.

Hence, Carlos is getting ready to test the app.

Answer:

Testing                                   I took the test I definetly testing <3

When you register to take classes, the registrar office pulls up a file full of
information about you, including your contact information, the list of classes you are
currently taking, classes you have completed, and your grades. What type of
productivity software is best suited for creating and storing this kind of information?
Spreadsheet
Word processing
Presentation
Database

Answers

Answer:

Database

Explanation:

Database software is intended to develop databases and to maintain, alter, access, and obtain useful data stored within them. It is often used to store, manage, and organize information such as field names, documents, and file structures in a database. it helps users to create their own databases to meet their business specifications and requirements. It provides data flexibility, as the storage process and formats can be modified without changing the entire program inside the database.

You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices

Answers

Complete Question:

You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices?

Group of answer choices

A. ARP

B. SMTP

C. SNMP

D. Telnet

Answer:

C. SNMP.

Explanation:

In this scenario, you administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. Also, you want the routers on the network to send you notices when they have exceeded specified performance thresholds. Hence, you should use the SNMP to enable the routers to send the notices.

SNMP is an acronym for simple network management protocol, which is a standardized application-layer protocol that is used for monitoring and organizing management information about network devices on either a wide area network (WAN) or local area network (LAN).

Basically, the SNMP helps to provide a common language for network devices such as switches, routers, printers, servers etc to share information with a network management system.

A simple network management protocol (SNMP) is part of the Transmission Control Protocol and Internet Protocol (TCP⁄IP) suite.

Peter took a selfie in his room. He was a wearing a light blue shirt. But he failed to realize that that shirt would clash in color with the light blue walls in his room. He wants to edit this photo using editing software. Which tool can Peter use to darken the background in his photo?

Answers

Answer:

A wand tool is to do that in an editing software.

Answer: Peter should use the burn tool

what are the uses of mobile phones?​

Answers

Answer:

We use mobile phones to:

1. communicate with our friends and family

2. looking for the information/news in the world

3. looking for the material for study

and many others

may it helps^_^

Answer:

Mobile phones are used for a variety of purposes, such as keeping in touch with family members, for conducting business, and in order to have access to a telephone in the event of an emergency. Some people carry more than one mobile phone for different purposes, such as for business and personal use.

Explanation:

Plz mark me as brainiest

Give two examples of a large databases that might be used to help members of the public

Answers

Answer:

Examples of large database that might be used to help members of the public are;

1) Apple Healthkit, Carekit and Researchkit

2) IBM Deep Thunder

Explanation:

1) The use of medical aid wearable devices that give instant data feed into the the a patients electronically stored health record has become possible and include the listed Apple technologies that enable the iPhone get instant access and feed back on individual health records

2) Large databases are used for weather forecasting by the processing of big data with the aid of very powerful computers by IBM Deep Thunder, which can also forecast natural disasters and the likelihood of wreckage in utility lines.

________ means that IT capacity can be easily scaled up or down as needed,which essentially requires cloud computing. A) agility B) flexibility C) responsiveness D) IT consumerization

Answers

Answer:

The correct option is;

A) Agility

Explanation:

Business agility is a measure of the responsiveness of business to business opportunities that is the time lapse between the emergence of a business opportunity and the the business formerly responding to the opportunity.

By similar analogy, IT agility is about the responsiveness of an organizations IT infrastructure to external stimuli. As such IT agility measures the systems adaptability to change (which may involve scaling down) or how easily it is for the IT system to be able to produce new transferable opportunities which involves scaling up as needed.

Can someone please tell me how I can hack WiFi with a raspberry pi in Kali Linux do I need a wireless adapter for raspberry pi if so please tell me and me ASAP please thanks appreciate it

Answers

lol wym hack wifi? need more info lol

Well honestly i dont know how to. i personally don't own one but there is YT videos. Go on YT and look up network chuck. hehas what your looking for.

what is the location in the base interface of the link to
create a table using wizard?
pls Answer me.
I'll make as BRIANLIST. ​

Answers

Answer:

Hey mate, here is your answer. Hope it helps you.

Explanation:

Before you can create objects such as tables and forms, you must first create the database file in which they will be stored.

1. On the File tab select New.

2. Click on Blank database.

3. In the File Name box, type a name for your database.

4. Click on the browse button to the right of the File name box to browse for a location for your

database.

5. Click on Create.

A new database will be created with a new default Table.

6. Click on Design View to start working with this Table.

You can use forms to control access to data, such as which fields of data are. Then open the table or query upon which you want to base the form. 2. To create a form on which all fields from the underlying table or query are placed. Then to be more selective about which fields appear on your form, you can use the Form Wizard.

Order the steps a user needs to follow to preview and then print a document

Answers

Answer:

Click file tab, click print tab, preview document, print document.

Answer:

Click file tab, click print tab, preview document, print document.

Explanation:

Click file tab, click print tab, preview document, print document.

Assume that the Measurable interface is defined with a static sum method that computes the sum of the Measurable objects passed in as an array, and that BankAccount implements the Measurableinterface. Also assume that there is a variable branchAccounts that is an object reference to a populated array of BankAccount objects for a bank branch. Which of the following represents a correct invocation of the sum method to find the total balance of all accounts at the branch?
A) Arrays.sum(branchAccounts)
B) Measurable.sum(branchAccounts)
C) BankAccount.sum(branchAccounts)
D) branchAccounts.sum()

Answers

Answer:

B) Measurable.sum (branchAccounts)

Explanation:

The user interface which can be built by adding components to a panel. The sum method that will be used to find total balance of all accounts at branch is measurable.sum, this will layout the sum of specified branch account total. The measurable interface implements public class bank account as measurable sum.

ternary operators of computer

please explain. ​

Answers

Answer:

It's a compact way of doing an if-else statement.

General Format is

<condition> ? <if condition is true> : <else>;

Example:

I could rewrite:

  if(a==1) temp = 1;

  else     temp = 999;

as

  temp = (a==1) ? 1 : 999;

A service that might appear to be a single server to external clients, but actually represents many servers living behind it, is known as a

Answers

Answer:

A reverse proxy.

Explanation:

A service that might appear to be a single server to external clients, but actually represents many servers living behind it, is known as a reverse proxy.

In Computer Networking, a single server can be configured to appear as the endpoint for many other servers acting behind it through the use of a reverse proxy.

Hence, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

You find a list of websites that relate to your chosen topic and click on the first one. You ask yourself the three questions presented in this lesson to see if this site is reliable: 1) Who wrote it? There isn't an author listed anywhere that you can find. 2) What type of site is it? The site name ends in . 3) How current is the information? You see the site was updated yesterday. Is this website reliable and worth examining further? True or False?

Answers

Answer:

False

Explanation:

Information reliability is essential in production. sourcing information from a reliable source is base on several criteria. They are; the author of the resource file, the type of media platform holding the information, the frequent revision of the information, additional support or collaboration to publish public information, etc.

A government website ( with the site-address ending with a '.gov' ) which is concurrently revised by the institute, gives a piece genuine and reliable information, whereas a commercial website with no author and just recently revised or published, would be judged as an unreliable source of information

Other Questions
A speeding car has a velocity of 80 mph; suddenly it passes a cop car but does not stop. When the speeding car passes the cop car, the cop immediately accelerates his vehicle from 0 to 90 mph in 4.5 seconds. The cop car has a maximum velocity of 90 mph. At what time does the cop car meet the speeding car and at what distance? Match each function formula with the corresponding transformation of the parent function y = 3x 1. y = -3^ x Translated up by 1 unit 2. 2.y = 3^ -x Reflected over the y-axis 3. 3.y = 3 ^x - 2 Translated right by 2 units 4.4. y = 3 ^x + 1 Translated down by 2 units 5.5. y = 3^ x + 1 Translated left by 1 unit 6.6. y = 3 ^x - 2 Reflected over the x-axisEverything is exponents of the three except the -2 at the end and the 4th one is also +1 not an exponent explain any four basic values of Indian constitution as mentioned in the Preamble to Indian constitution. Which of the circumstances below most accurately describes conditions that are likely to permit a robust anti-tumor adaptive immune response?a. A tumor with high expression of proteins that have mutations in sequences encoding HLA-binding peptides.b. A robust acute inflammatory response to PAMPs expressed specifically by tumor cells.c. Anti-tumor T lymphocytes that have high expression of CTLA-4.d. A tumor with high expression of PD-L1. PLEASE HELP WILL GIVE BRAINLIEST AND THX Which ratios have a unit rate of 3? Choose all that apply. 15/2 cups: 2 1/2 cups 1 cup: 1/4 cups 2/3 cups: 1 cup 3 3/4 cups: 2 cups 2 cups: 2/3 cups 2 1/2 cups: 5/6 cups Che MFG Company experiences the following cost behavior patterns each week Fixed costs: supervisor's salary $1,200; factory rent $2,900 Mixed costs: utilities $1,700+ $5.75 per unit Variable costs per unit manufacturing labor wages $21.00; supplies used in production $9.00; packaging cost $2.75, warranty cost $4 Required: Compute total costs to be incurred for a week with 2,770 units of activity. (Do not round intermediate calculations.) Total cost___________ How do the pieces of the quilt embody cultural heritage? Approximating the eye as a single thin lens 2.70 cmcm from the retina, find the focal length of the eye when it is focused on an object at a distance of 265 cmcm Just need to calculate the area of the shaded region, thanks The length and width of a book cover are 22.2 centimeters and 12 centimeters respectively. The actual length (and width) can be 0.3 unit less than the measured length (and width) or 0.3 unit greater than the measured length (and width). a. Find the minimum and maximum possible lengths and widths of the book cover. b. Calculate the minimum and maximum possible areas of the book cover. Solve the consumers problem for Johns optimal demand for Germ-X and Purell. (You should find actual numbers representing the quantity of Germ-X chosen and the quantity of What challenges in living with another family during an emergency? I y=k/x, x is halved.what happens to the value of y 2) Micah and Taylor investigate the effect of tap water and spring water on the growth of plants.They grew two plants of the same type and size in separate containers. Every three days, theyadded the same amount of tap water to one plant and the same amount of spring water to theother. Describe an action that would best improve the reliability of their results? Properties of Water Lab ReportInstructions: Choose a property of water and design an experiment to test the property. Use the following lab template to ensure all lab report components are included. Title:Objective(s):Identify the purpose of your investigation or the question you are attempting to answer. Be sure to tie in the property of water you are testing.Safety Notes:Always have parent(s) or guardian(s) permission and supervision when performing a lab activity at home.Wear proper protective clothing and eyewear when needed.Be sure to dispose of all materials properly.Always wash your hands carefully after touching anything in a lab investigation.Hypothesis:Variables:Independent Variable:Dependent Variable:Controlled Variable:Materials: Procedure:The procedure should be clear and detailed so that others can repeat it. The details should be specific in how the procedure changes the independent variable, controls all variables that need to be controlled, and observes or measures the resulting changes to the dependent variable.Data and Observations:Present all data and observations in a neat and organized manner. Include tables and graphs where appropriate/possible.Conclusion:Be sure to answer the following reflection questions as a summary in the conclusion of your lab report:Was your hypothesis correct? Why or why not? What were the results of your experiment?What changes would you make if you were to repeat the experiment?Questions: Using what you have learned in the lesson and the experiment, answer the following question in complete sentences. Analyze the property of water you investigated and provide some real-world applications of the importance of this property of water. Based on fossilized evidence, there are scientific claims made about the evolution of certain species. If a scientist studying the fossils of a specific species had a hypothesis other than what was currently accepted, what steps should be taken to have the alternative hypothesis considered How was the rule of Cyrus the great different than Babylonian rulers Which describes a grizzly bears habitat? all the biotic factors in the ecosystem all the abiotic factors in the ecosystem the role of the bear in the ecosystem the physical area where the bear lives A study found that the expected annual income in a certain area is $17,255. Which of the following statistical measurements most likely led to this conclusion? Mean, range, median or mode? How does the constitution provide for the separation of church and state