What is a protocol in digital technology plwwes help

Answers

Answer 1

Protocol, in computer science, a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it.


Related Questions


DOES ANYONE KNOW COMPUTER SCIENCE?

Answers

Answer:

statClass.java

Explanation:

You use the classname of the public class.

One of those will contain main()

Note that this example has a typo. statClass vs startClass.

Can anyone help me out with my photography questions?

Answers

Verifying, The answer above me is correct

Please define processor​

Answers

Processor means to break down something.

Sidney needs to create a decimal number variable that will be added to another number. What kind of variable is required?binaryBooleanstringfloat

Answers

Answer:

Option D. float is the correct answer.

Explanation:
Decimal number contains decimal point. Out of all the given data types, float data type store the number with decimal point.
As the number has to be further used for calculations float ahs to be used. Because the numbers can also be stored in string but cannot be used for further calculations.

Is this statement true or false? While in slide show mode, a click and drag is no different than a click. True false.

Answers

In slide show mode, it should be noted that a click and drag is the same as a click. Therefore, the statement is true.

It should be noted that slide show mode typically occupies the full computer screen. One can see how the graphics and animations will look during the actual presentation.

Rather than waiting and clicking, one can make the PowerPoint files open directly in the slide show mode. Therefore, it's not different from clicking.

Learn more about slideshow on:

https://brainly.com/question/25327617

Answer:

"True"

Explanation:

I took the test!

1. What is the difference between a columnn and a row?
2. How many rows are being used?
3. How many columns are being used? rows?
3. Who got the highest grade on Quiz 1? What is its cell reference?
5. What is the range of cell of all the names of the students?

Answers

1. Column is like the one shows as A B C it’s like a Group. row is like each person from the group like Column A is the students names Column B is their 1st quiz grades I’m sorry if ur confused I’m bad at explaining it

________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.

Answers

Answer: Database administration

Explanation:

What commands does SuperKarel know that regular Karel does not?

turnleft() and jump()

O

turnRight() and jump()

O

turnAround() and turnRight()

O

turnAround() and jump ()

Answers

Answer:

turnRight and turnaround

Explanation:

The regular karel does not know these commands

The command that SuperKarel know that regular Karel does not is turnAround() and turnRight(). The correct option is C.

What is Karel?

Richard E. Pattis created Karel, an educational object-oriented programming language, to help teach programming to his Stanford University students.

Through simple object-oriented commands, the student learns to program by instructing Karel, a robot, to move, pick up a beeper, place a beeper, and turn off.

KAREL was developed as an educational tool to teach programming language elements to students studying robotics.

KAREL has since evolved into the primary FANUC programming language for robots and robot controllers. This powerful CNC programming language is extremely versatile.

SuperKarel understands two commands that regular Karel does not: turnAround() and turnRight ().

Thus, the correct option is C.

For more details regarding KAREL, visit:

https://brainly.com/question/13278951

#SPJ5

What security setting can cause a mobile device to erase installed apps and data if the passcode is incorrectly entered a number of times

Answers

Answer:

A Hard Reset. Aka a data wipe

Explanation:

a hard reset will allow you to completely clear all information on a device without having to log into it. It will set the phone back to factory defaults.

Write true or false:-
1. The start attribute always accept an integer value.
2. Description list is used to create a bulleted list.
3. The <DT> tag is used to create a table in HTML.
4. The <TR> tag is used to create cells in the table.
5. The VALIGN in attitude of the <TD> tag is used to Align the position of text in the cell vertically.

And please don't give only one answer, if you are giving, then please give all the answers. ​

Answers

Answer:

false

true

false

true

false

Explanation:

.

The ____ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model.

Answers

Answer: Application

Explanation:

can some one make me a pandora account and give me the email and the password to it please

Answers

Answer:

Ill do it but you do know someone can see the information right?

Explanation:


HELP IMPORTANT!!

i need help with Java basics

Answers

Answer:

C

Explanation:

Strings should be concatenated with +.

Not all ________ access is malicious, but it should still be prevented; for example, a user may poke around a network share and see sensitive information.

Answers

Answer:

System access.

Explanation:

System access aka admin privileges are not meant for any user in a network.It should be handled by professionals

how to send an email to multiple recipients individually outlook

Answers

Answer:

Include multiple people in the "To" section. picture attached below.

which of the following is a true statement?

A. in the customary system measurements are often expressed as decimals.

B. in the metric system measurements are often expressed as fractions.

C. in the customary system measurements are often expressed as fractions.

D. fractions are equally common in both the metric and customary systems.​

Answers

Answer:

C

Explanation:

yeah-ya........ right?

can someone pelaseee help

Answers

Answer:

Explanation:

develloppemetn de grace en option est logiquement une biologiste experimenter des annes 1256 a toulouse en france

Identify the type of software that should be in main memory in order to use the keyboard? *


A. word processing software

B. systems software

C. spreadsheet software

D. applications software

Answers

Answer:

Ok so im not completely sure about this but i think its

Systems Software

Explanation:

because word processor is for typing documents and stuff

spreadsheet is for like tracking you money your daily money or something

or some kind of graph for stuff like that (i think)

applications software well your keyboard isn't a application unless its the on screen keyboard

so the only one left is system software

hope it helped :)))) (●'◡'●)

Do you want to run a listing to see files that were used by the last access date is date does not display by default which command would you use to find additional properties of the files to reference.

Answers

Considering the situation and the computer application, the command you would use to find additional properties of the files to reference is "Get-childitem | get-member "

What is Get-childitem command?

Get-childitem command in computer applications is used to get the items in specific locations.

Get-childitem command can be used to gets the items inside a file container, usually referred to as child items.

Similarly, the Get-member command used to gets the members, the properties, and methods of files.

Hence, in this case, it is concluded that the correct answer is Get-childitem | get-member

Learn more about Computer commands here: https://brainly.com/question/25243683

The ________ command is one of the most commonly used command-line commands. It can be used to check IP connectivity between two network devices.

Answers

Answer:

ipconfig

Explanation:

That is the actual

command

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting B. Marcotting C. Layering D. T-Budding

Answers

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting

Understanding that protection of sensitive unclassified information is:

Answers

Answer:

Not necessarily malignant

Explanation:

As the word "unclassified" shows it's not damaging, however I still doesn't recommend if it's not necessary.

1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m)
= Y
2. Decrypt this cipher text into a binary string: 106

I am very stuck and still don’t know how these work.

Answers

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

A(n) _____ is a formal meeting between an employer and a job applicant
a.
background check
b.
gatekeeper
c.
interview
d.
personality test


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

C. Interview

Explanation:

Interview

Answer:

C. interview

Explanation:

edge 2022

imagery functions as a coding system to help individuals acquire movement patterns. this describes

Answers

Answer:

Imagery can be used to develop qualities in yourself you'd like to have — it's like emotional body-building — and using a technique called “Evocative Imagery” you can cultivate courage, patience, tolerance, humor, concentration, self-confidence or any other quality you'd like to embody.

congress are smart becuase.....

Answers

Answer:

If we are talking about government then they are smart bc of there two house policies, both are equal yet super unique. They make sure each state has an equal voice in the senate.

Megan owns a small neighborhood coffee shop, and she has fifteen employees who work as baristas. All of the employees have the same hourly pay rate. Megan has asked you to design a program that will allow her to enter the number of hours worked by each employee and then display the amounts of all the employees’ gross pay. You determine that the program should perform the following steps:

1. The text that is in the file is stored as one sentence. Incorporate the code that reads the file’s contents and calculates the following:
a. total number of words in the file
b. total average number of words per sentence
c. total number of characters in the file
d. total average number of characters per sentence


file name: employee_names.txt
file text:
George Thomas
Melinda Harris
Norah Jeddery
Jorge Ortiz
Samantha Gregory
Tanvi Gupta
William Edwards
Tania Gomez
Erica Sanders
Gracie Lou Freebush
Tony Montana
Obi-Wan Kenobi
Cruella De Vil
Marty McFly
Napoleon Dynamite

Answers

Answer:

she gives 10 dollars an hour

Explanation:

no

power steering belts should be checked for all of the following EXCEPT

Answers

You did not list the options.

"schools should use a wireless network instead of a wired network".

discuss this statement.

(6 marks) ​

Answers

hi there!

Answer:

I agree with this statement as wireless networks are better than wired ones especially for a huge structures like a school. in a big you will have to use kilometers of cables to set up a network, whereas you can set up the same network using a few access points and much less cables of course.

hope this helps.

Why should you pay your full credit card balance by the due date every month?​

Answers

Answer: to avoid late fees and interest

Explanation:

Other Questions
how can we protect how can we protect ourselves from the bad effects of drug addiction Which of these is the best definition of sustainable development?A. Development that makes sure buildings are strong enough to sustain large hurricanes and earthquakesB. Development that's typical of underdeveloped nations that derive their products directly from natureC. Development that's supported by public opinionD. Development that ensures the protection of the environment in the long term please help me with geometry What conversion factor would we need to convert moles of helium to atoms of helium? Tina's teacher scolded ____________ for not completing her homework, us, he , she, it , they, them , her, I , me, you A lawyer commutes daily from his suburban home to his midtown office. The average time for a one-way trip is 24 minutes, with a standard deviation of 3.8 minutes. Assume the distribution of trip times to be normally distributed. (a) What is the probability that a trip will take at least hour?(b) If the office opens at 9:00 A.M. and he leaves his house at 8:45 A.M. daily, what percentage of the time is he late for work?(c) If he leaves the house at 8:35 A.M. and coffee is served at the office from 8:50 A.M. until 9:00 A.M., what is the probability that he misses coffee?(d) Find the length of time above which we find the slowest 10% of trips.(e) Find the probability that 2 of the next 3 trips will take at least one half1/2 hour. A manufacturer knows that their items have a normally distributed lifespan, with a mean of 5.8 years, and standard deviation of 1.7 years. The 10% of items with the shortest lifespan will last less than how many years? Find the measure of the indicated angle to the nearest degree 36 Please help!! Given the recursive formula shown, what are the first 4 terms of the sequence? Tm th tch ca khi bao bi mt z=5+(x4)^2+2y v mt x=3,y=4 v mt phng ta . A scandal in Bohemia. summary. it should be short and sweetplease help me A husband and wife have a child who suffers from cystic fibrosis (CF), an incurable, fatal hereditary disease that results in frequent infections and difficulty breathing. The couple wants to determine their risk of having another child with this disorder. Because CF is a recessive disorder, a child usually must inherit the CF gene from both parents to get the disease. A child with just one CF gene is a carrier: Such a person doesn't have the disorder 'but can pass the trait on to the next generation. The DNA test revealed that the mother of the child carried the CF trait; however, her husband did not. The DNA tests showed that he was not the biological father of the child.This test has put the counselor in a difficult situation. Should the counselor tell the couple about the nonpaternity findings? Should the mother be told privately? If so, is the center colluding with the mother to withhold information from the husband? In addition, this case brings up issues concerning the biological father of the child. This man has not contracted with the genetics center for the test, yet the counselor now knows that this man is probably a carrier of the mutant gene for CF. Required:a. Should the genetic counselor call this man and tell him about his risk? b. What would you do if you were the genetic counselor? c. Present arguments for both sides of the issue. Though the novel opens with a literal collision, it depicts a number of figurative collisions as well--cultural, racial, natural, familial, marital, and others. Describe some of these collisions, and discuss why they happen. PLZ HELP ME WITH MY WORK 4.In humans, the allele which confers the ability to roll the tongue is dominant over the allele which does not confer the ability to roll the tongue. If a man who can roll his tongue and whose mother could not mates with a woman who cannot roll her tongue, what proportion of the children would be expected to be able to roll their tongues if they have a large number of children what is communication From earliest to latest, the overall sequence of early development proceeds as follows: A) gastrulation organogenesis cleavage B) ovulation gastrulation fertilization C) cleavage gastrulation organogenesis D) gastrulation blastulation neurulation E) preformation morphogenesis neurulation MacKenzie is studying how welfare policies affect working families. She has paid several visits to families who have agreed to participate in her study and has interviewed them. She has also asked them to fill out a questionnaire about the issues in their daily lives, such as household budget and martial harmony. With this info, she is trying to link the effects of welfare policies to these family issues. The study conducted by MacKenzie is part of _________. Which claims are supported by relevant evidence? Select two options. what is an alternative???????