1. What is a Network?

A.an arrangement of intersecting horizontal and vertical lines.

B.a group or system of interconnected people or things.

C.files on a computer

D.a device drive used to carry information




Answers

Answer 1

B. a group or system of interconnected people or things


Related Questions

What is Polymorphism in programming? Explain in your own words with examples.

Answers

Answer:

A computer program which can change on it's own, such as a polymorphic virus that is harder to detect. It can change it's own code to achieve the same goal but have a different structure.

Explanation:

Answer:

Polymorphism is a feature of object-oriented

programming languages that allows a specific routine to use variables of different types at different times. Polymorphism is the ability of a programming language to present the same interface for several different underlying data types.

Explanation:

hope it helps

PLEASE PLEASE HELP pleeeeeeeeeaaaase

Answers

Answer:

Truuuuuuueee

Explanation:

Plz give brainliest

Answer:

It's true

Explanation:

I just had the same question , ur welcome :)

Match each operating system drawback to its respective operating system.

1. more susceptible to viruses Linux. Operating System
2. fewer compatible applications Microsoft Windows Operating System
3. limited support system Apple Operating System

Answers

Answer:

Microsoft Windows - More susceptible to viruses

Linux - Limited support system

Apple - Fewer compatible applications

Explanation:

Generally windows is more susceptible to viruses.

Linux is open source meaning it's up to the community to help you.

Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.

Answer:

1. Microsoft Windows is more susceptible to viruses

2. Mac OS X (Apple OS) has fewer compatible applications

3. Linux OS has a limited support system.

Write a pseudocode algorithm that ask a user to enter three numbers. The program should calculate and print their average

Answers

Answer:

BEGIN

INPUT first_number, second_number, third_number

average = (first_number + second_number + third number)/ 3

PRINT average

END

Explanation:

That is the simplest answer one can create

Can you use 2 wireless keyboards and 2 wireless mouse on a dual monitor desktop without interfering with the other monitor ?

Answers

Answer:

I'm pretty sure this is not possible on Windows OS.

Explanation:

Two different monitors can work, as you probably know, but I don't think you can use separate keyboards and mice on the same machine.

Compare the OSI Application Layer with the TCP/IP Application Layer. Which statement is true? Both application layers are relevant mainly to programmers, not to network technicians. The OSI application layer involves more things than does the TCP/IP application layer. They are the same layer, only they are viewed through different conventions. The TCP/IP application layer is for the user; it is not important to programmers or network technicians.

Answers

Answer:

They are the same layer, only they are viewed through different conventions.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

On the other hand, the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer comprises of four (4) main layers and these includes;

I. Application layer.

II. Transport layer.

III. Internet layer.

IV. Network layer.

This ultimately implies that, the Open Systems Interconnection (OSI) Application Layer and the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer are the same layer, only they are made up of different number of layers and as such are viewed through different conventions.

Answer:

c

Explanation:

PLEASE HELP !!!!!!!!!!!!!
What is revising?

Answers

Answer:

Revision literally means to “see again,” to look at something from a fresh, critical perspective. It is an ongoing process of rethinking the paper: reconsidering your arguments, reviewing your evidence, refining your purpose, reorganizing your presentation, reviving stale prose.

what method of technical drawing uses converging lines?

Answers

The foundation of linear perspective is the concept of diminution, which states that objects appear to get smaller as they travel farther away from the observer.

What's a good illustration of linear perspective?

The seeming convergence of two parallel lines, particularly when looking at a lengthy section of two-lane highway, is an illustration of linear perspective. People who watch the highway in front of them have the impression that the lanes are converging at the horizon.

One kind of linear perspective is one point perspective. In a flat work of art, linear perspective creates the appearance of space and form by using lines to depict objects. It is a methodical method of drawing. One point perspective, which only uses one vanishing point, earns its name.

There are three forms of linear perspective. One point, two point and three point. When the vanishing point for the objects in your picture is close to the center of the scene, you have one point perspective, which is the simplest sort of perspective.

To learn more about linear perspective  refer to

https://brainly.com/question/22902116

#SPJ1

Kevin created a scene in an animation where he shows a leaf falling slowly. Which principle of animation did he follow in doing so? Kevin is using the principle of ____. This principle is proportional to the _____ of the objects displayed. Answers given for the first: Arcs, Timing, Staging Answers given for the second: Height, Length, Speed

Answers

Answer:

Kevin is using the principle of Timing. This principle is proportional to the Speed of the objects displayed.

Explanation:

Timing is one of the principles of animation wherein the speed of the movement of an object is controlled by the animator and made to harmonize with certain effects such as sounds. In an example of some projected balls we find that when getting to the peak, their movement is slower compared to when they are coming down.

Speed plays a key role here. This is similar to the slowly falling leaf. Speed and timing are major considerations. When paired with good sounds, the animation comes off better.

z 1
-- = --
7 21
solve​

Answers

Answer:

[tex]z= \frac{1}{3}[/tex]

Explanation:

Given

[tex]\frac{z}{7} = \frac{1}{21}[/tex]

Required

Solve

[tex]\frac{z}{7} = \frac{1}{21}[/tex]

Multiply both sides by 7

[tex]7 * \frac{z}{7} = \frac{1}{21} * 7[/tex]

[tex]z= \frac{1}{21} * 7[/tex]

Rewrite as:

[tex]z= \frac{1 * 7}{21}[/tex]

[tex]z= \frac{7}{21}[/tex]

Simplify fraction

[tex]z= \frac{1}{3}[/tex]

hi please help ASAP it's about html!​

Answers

Given :-

Create a HTML code for writing a web page for your school time-table.

Answer :-

<html>

<head>

<title> Time Table </title>

</head>

<hrcolor = "red">

<hrcolor = "blue">

<body>

<table><tr = "7"><md = "7"><Period 1_></table>

</body>

</html>

[tex] \\ [/tex]

Answered by - ItzMaster

We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the challenges you would face in such a scenario.

Answers

Answer:

Explanation:

Everything runs on the internet nowadays. Living without internet would bring many challenges. One of which would be difficulty making purchases. It is not always easy to find what you need close by which is why the majority of commerce nowadays is done through the internet. Another difficulty would be the lack of information, not being able to quickly search for something. Lastly, and probably the most important is the lack of communication. Without internet, you would lose contact with many loved ones around the world and would be limited to telephone communication.

What is the difference between a patent and a copyright?
A copyright protects inventions, a patent protects intellectual property.

B copyright protects intellectual property; a patent protects inventions.

C Copyrights are for music, and patents are for books.

D Patents are for books, and copyrights are for music.

Answers

Answer:b

Explanation:

The difference between a patent and a copyright is,

B) Copyright protects intellectual property; a patent protects inventions.

Given that,

To find the difference between a patent and a copyright.

We know that,

Copyrights primarily safeguard original works of authorship, such as literary, artistic, musical, or dramatic creations.

On the other hand, patents are granted to inventors to protect new and useful processes, machines, compositions of matter, or any new and inventive improvement thereof.

So, copyrights are more about creative expressions, like music and books, while patents are focused on protecting unique and innovative inventions.

Option B is true.

To learn more about copyright visit:

https://brainly.com/question/357686

#SPJ4

What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
The most common thing to share in Outlook is the calendar.
The Publish Online option is for users outside an organization.
Changing calendar permissions only changes what a user can see.
Publishing a calendar online will allow anyone in the world to see it.
The Share option opens an email message that sends the calendar link.
O Calendar sharing options include Email, Share, Publish Online, and Delegate.

Answers

Answer:

The characteristics of calendar sharing options in Outlook 2016 are;

1) The most common thing to share in Outlook is the calendar

2)  The Publish Online option is for users outside an organization

4) Publishing a calendar online will allow anyone in the world to see it

5) The Share option opens an email message that sends the calendar link

6) Calendar sharing options include Email, Share, Publish Online, Delegate

Explanation:

1) Sharing is used mostly by a group of people working on a given project

Items commonly shared in Microsoft Outlook includes email Folders calendars and address books (contacts)

Therefore, for people working on a project together, the most common thing to share in Microsoft Outlook 2016 is the calendar

2) The Publish Online option allows a user to make a calendar available to people outside the organization

3) The calendar sharing permissions are;

a) Who can view the date and time marked as busy

b) Who can view the location and titles of appointments

c) Who can view all the calendar details

d) Who can edit

e) Who can delegate

Therefore, changes in calendar permissions does not only change what the user can see

4) When publishing a calendar, a special URL is created that can be shared to people outside of an organization

A published calendar can be viewed by everyone that has the calendar link

Therefore, publishing a calendar online will allow anyone in the world to see it

5) When a calendar is shared, the person with which the calendar is shared will receive an invitation email for the invitee to accept with an "Open this Calendar" button

Therefore, the Share option opens an email message that sends the calendar link

6) Calendar sharing options includes

a) Sharing the calendar within the organization

b) Publishing a calendar to the web to share the calendar

c) A calendar can be shared in an email

d) Authority can be delegated to a particular calendar

Therefore, calendar sharing options include Email, Share, Publish Online, Delegate

1, 2, 3, 5

just did it

In python please!! Write the definition of a function named countPos that needs integer values from standard input until there are none left and returns the number that are positive. The function must not use a loop of any kind.

Answers

Answer:

Explanation:

The following code is written in Python it doesn't use any loops, instead it uses a recursive function in order to continue asking the user for the inputs and count the number of positive values. If anything other than a number is passed it automatically ends the program.

def countPos(number=input("Enter number: "), counter=0):

   try:

       number = int(number)

       if number > 0:

           counter += 1

           newNumber = input("Enter number: ")

           return countPos(newNumber, counter)

       else:

           newNumber = input("Enter number: ")

           return countPos(newNumber, counter)

   except:

       print(counter)

       print("Program Finished")

countPos()

A man-in-the-middle attack or impersonation are likely to result in problems with

data availability.

data confidentiality.

data integrity.

data mining.

Answers

Answer:

Data Confidentiality

Explanation:

A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.

A man-in-the-middle attack or impersonation is likely to result in problems with data confidentiality. Thus, option B is correct.

What is a  man-in-the-middle attack?

A man-in-the-middle (MITM) attack is a broad name used whenever an abuser inserts himself into a conversation between a user and now an application. That will listen in on the conversation or to pretend to be one of the participants and create the impression that normal information-sharing is taking place.

Attacks compromise the integrity and confidentiality of exchanges, which exposes information, technology, and other things to malevolent use. Consider the threat if a hacker was able to remotely open an automatic door lock or deploy the airbags in a linked car.

Therefore, option B is the correct option.

Learn more about man-in-the-middle attack, here:

https://brainly.com/question/13014110

#SPJ6

1) The Output of a computer can be seen on
b) Mouse
a) Monitor
c) Keyboard​

Answers

Answer:

Explanation:

Option B monitor is the correct answer

Answer:

ans is a

hello

myself swapna

ANSWER ALL QUESTIONS CORRECTLY PLEASE AND YOU WILL GET A BRAINLIEST AND 10+ POINTS!!!! I WOULD REALLY APPRECIATE IT

Through the use of ICT and emerging technology in todays world, a number of sectors have been affected (whether in a positive or negative way). Three sectors in which ICT has had an impact are the health care, education, and banking sector.
Define the term ICT?

List three ICT tools that are commonly used in the education system?


Identify two ways in which ICT has impacted the education sector?

Answers

Answer: uhm can u explain what ICT is so i can understand the questions pls when i whould gladly help :)

Explanation:

Datawriter
Create a File object using "data.txt" as the argument to its constructor. Store the reference to the new File object in a variable of type File.
Will mark brainliest

Answers

Answer:

Explanation:

How is a high-level programming language compiled? (5 points)
O a
A binary interpreter is used to translate each line of code.

All lines of code are translated together and then executed at once.
ос
One line of code is translated and then executed before moving to the next line.
d
Six lines of code are translated and then executed before moving to the next set of six.

Answers

Answer:

A high-level language is a programming language that uses English and mathematical symbols in its instructions. To execute a program in a high-level language, it can be compiled or interpreted. A compiler translates the entire program written in a high-level language to machine language prior to execution. After the compiler translates the code into machine language, it is typically executed line-by-line.

Explanation:

Answer:

One line of code is translated and then executed before moving to the next line.

Write a JavaScript program to create a multiplication table for numbers 1 to 12 using a while loop. I’ll mark brainliest, thanks

Answers

Answer:

</p><p>

</p><p>days1(); // calling function days1()

</p><p>

</p><p>function  days1() // function days1

</p><p>

</p><p>{

</p><p>

</p><p>var  week = ["sunday ", "monday ", "tuesday "," wednesday"," thursday",

</p><p>

</p><p>"friday"," saturday"];

</p><p>

</p><p>var i;

</p><p>

</p><p>for (i=0;i<7;i++)  // iterating over the loop

</p><p>

</p><p>{  

</p><p>

</p><p>document.write(" The number of days in a week :" +</br>);

</p><p>

</p><p>document.write( week[i] + "</br>" );  // print the number of days

</p><p>

</p><p>}

</p><p>

</p><p>}

</p><p>

</p><p>

Output:

The number of days in a week :

sunday

monday

tuesday

wednesday

thursday

friday

saturday

Explanation:

In this program, we create a function days1().In this function, we declared an array i.e "  week " which will store the list of the days of the week. After that, we iterate the for loop and prints a list of the days of the week.

Arranging a given set of data in ascending or descending order is ...................​

Answers

Explanation:

maybe it's answer is sorting

You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing

Answers

Answer:

The right approach is Option b (volume testing).

Explanation:

A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.The application functionality has been analyzed by determining the maximum volume throughout the database.

Other options are not related to the given query. So the above is the right response.

Who is Carl Thompson?

Answers

Carl Thompson was a well know Jazz player back in the mid 1900s

how important the role of valet and butler service in the hospitality

Answers

very important bc they help you with what you need.

A DTP firm has published and printed fliers for an upcoming fundraising event. In which section of the flyer would you find the contact details of the DTP firm
A. Body
B. Credits
C. Navigation
D. Title

Answers

B.Credits at the end of the flyer

What is the dark, sticky substance that forms when tobacco is burned?

Answers

Answer: Tar.

Explanation:

A chemical substance made when tobacco is burned. Tar contains most of the cancer-causing and other harmful chemicals found in tobacco smoke. When tobacco smoke is inhaled, the tar can form a sticky layer on the inside of the lungs.

The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet. What should you do

Answers

Answer:

Have them try again. If it still is wrong then maybe dont let them use the internet!

About C header files of C programming

Answers

Answer:

A header file is a file with an extension. Which contains C function declarations and macro definitions to be shared between several source files. There are two types of header files: the files that the programmer writes and the files that come with your compiler.

Write a program that asks the user for the name of a file. The program should display the contents of the file with each line preceded with a line number followed by a colon. The line numbering should start at 1. (You can create a file and populate it with some data, then run your program to open that file and display the contents line by line with the number of the line preceding the line data)

Answers

Answer:

Explanation:

The following program is written in Python. It asks the user for the file name (which needs to be in the same directory as the program) and reads the file. It then splits it by lines and saves it into an array. Then it loops through the array, printing each line with its corresponding line number.

file_name = input("File Name: ")

f = open(file_name, 'r')

lines = f.read().split('\n')

for line in lines:

   print(str(lines.index(line) + 1) + ': ' + line)

Other Questions
Need help please, it's urgent. about organizational structure of prose. Thank you. 1. What is 6 9/16 written as a decimal?A -6.625B -6.5625C -6.4375D-6.125 Please help me! Please! I am so lost! Pythagorean Theorem!(The prism said to have an equilateral triangle base has the measurements shown)Part AAre the bases of the prism equilateral triangles? Why or why not? Note: the bases of a triangular prism are triangles.Part BFor this prism to be a right prism, all the lateral faces must be rectangles. Is enough information given to prove the lateral faces are rectangles? Why or why not?Part CWithout using a protractor, you can determine whether the angles are right angles by measuring the length of the diagonal and applying the converse of the Pythagorean theorem. The length of both diagonals for each lateral side is 13 cm. From this can you prove that the lateral sides are rectangles? Why or why not?Part DSome of the measurements of the triangular prism with a right angle base are shown. What is the length of the hypotenuse of the base?Part EWhich lateral face has the largest area, the bottom one, left one, or diagonal one? What is the area? The radius of a circle is 1 meter. What is the circle's area? Mr. Strand mowed 2 5 of his lawn. His son mowed 1 3 of it. Who mowed most of the lawn? How much of the lawn still needs to be mowed? . How many ships and aircraft did each side use on the battle of midway Please help!Look at the graph below. (Attachment)Which of the following stars is most likely to be red?Select one:a. Star Ab. Star Bc. Star Cd. Star D Select the correct answer.What has affected almost every aspect of modern sports?A.technology.InjuriesC. politicsD.weather The counterculture's rejection of mainstream American values was expressed through its embrace of:a) unconventional appearance, music, drugs, and sexual liberationb) song lyrics and popular sayings of the period, such as "turn on, tune in, drop out"c) protest for civil rights, civil liberties, environmentalism, and the end of the vietnam ward) all of the above May have These answered again Im Trying To check To Make sure its right I need help on This Carlota does 2000 J of work on a machine. The machine does 500 J of work. What is the efficiency of the machine?4%25%75%400% A student uses a lever and fulcrum to lift a rock off the ground.Which option describes when potential energy is converted into kinetic energy during this process?a. when the lever is wedged beneath the rock but before it has been liftedb. when the student presses down on one side of the lever to cause it to movec. when the rock rests on the ground without the leverd. when the rock rests above the ground Need help with this asap! Rachel is studying the causes, consequences, and treatments of mental illness. She samples 100 people diagnosed with generalized anxiety disorder. She provides each individual in her sample weither a new untested drug, a placebo, or a nocebo (which occurs when a person expects negative side effects of a medication), Rachel measures sympathetic nervous system arousal a week befand a week after the study. The results of the study appear in the following graph.70 The Florida panther used to live in forests, prairies, and swamps over most of the southeastern United States. Now, it lives only in the southern tip of Florida, south of the Caloosahatchee River. Based on this information, what is the most likely cause of the decline of the Florida panther population? help fast plz !!!!!!!!! A caf has a monthly fixed cost of $4700, and a typical customer order costs the caf $2. Therefore, the cost to serve x customers in a month is given by x = 4,700 + 2x. The typical order costs $10. So revenue is y = 10x. Find the number of customers that would need to come in the caf for the company to break even. (Intersection point) In addition to appearing before nouns and pronouns, where else do adjective often appear in sentences? Select all that apply.after the verb ranafter the verb wasafter the verb isafter the verb am How did Dollar Diplomacy help prevent costly wars?A. It spread American influence by buying countries.O B. It spread American influence through business.O C. It spread American influence by means of the gold standard.D. It spread American influence through missionary activity. H ELP!!!Question 4 of 7Which stem-and-leaf plot represents the data sets shown?Set A Set B67 7271 6884 8562 7656 76A.The figure shows a stem-and-leaf plot for two sets Set Upper A and Set Upper B. Stem column is shown in the middle and the leaf columns for Set Upper A and Set Upper B are shown on the left and on the right respectively. For stem as 5, there is 6 in the left column, for stem as 6, there are 2 and 7 in the left column and 8 in the right column. For stem as 7, there is 1 in the left column and 2, 6, and 6 in the right column. For 8 as stem, there is 4 in the left column and 5 in the right column. To the right of this plot it is labeled 8 as stem and 4 and 5 on the left and right respectively, equals 84 and 85.B.The figure shows a stem-and-leaf plot for two sets Set Upper A and Set Upper B. Stem column is shown in the middle and the leaf columns for Set Upper A and Set Upper B are shown on the left and on the right respectively. For stem as 5, there is 6 in the left column, for stem as 6, there are 2 and 7 in the left column and 8 in the right column. For stem as 7, there is 1 in the left column and 2, and 6 in the right column. For 8 as stem, there are 4 and 8 in the left column and 5 in the right column. To the right of this plot it is labeled 7 as stem and 1 on the left and 2 and 6 on the right respectively, equals 71, 72 and 76.C.The figure shows a stem-and-leaf plot for two sets Set Upper A and Set Upper B. Stem column is shown in the middle and the leaf columns for Set Upper A and Set Upper B are shown on the left and on the right respectively. For stem as 5, there is 6 in the right column, for stem as 6, there are 2 and 7 in the right column and 8 in the left column. For stem as 7, there is 1 in the right column and 2, 6, and 6 in the left column. For 8 as stem, there is 4 in the right column and 9 in the left column. To the right of this plot it is labeled 8 as stem and 9 and 4 on the left and right respectively, equals 89 and 84.D.The figure shows a stem-and-leaf plot for two sets Set Upper A and Set Upper B. Stem column is shown in the middle and the leaf columns for Set Upper A and Set Upper B are shown on the left and on the right respectively. For stem as 5, there is 6 in the left column, for stem as 6, there are 2 and 7 in the left column and 8 in the right column. For stem as 7, there is 1 in the left column and 2, 6, and 6 in the right column. For 8 as stem, there is 4 in the left column. To the right of this plot it is labeled 6 as stem, there are 2 and 7 on the left and 8 on the right respectively, equals 62, 67 and 68.