Answer:
Paquete de red o paquete de datos es cada uno de los bloques en que se divide la información para enviar, en el nivel de red. Por debajo del nivel de red se habla de trama de red, aunque el concepto es análogo. En todo sistema de comunicaciones resulta interesante dividir, la información a enviar, en bloques de un tamaño máximo conocido. Esto simplifica el control de la comunicación, las comprobaciones de errores, la gestión de los equipos de encaminamiento (routers), etcétera.
Al igual que las tramas, los paquetes pueden estar formados por una cabecera, una parte de datos y una cola. En la cabecera estarán los campos que pueda necesitar el protocolo de nivel de red; en la cola, si la hubiere, se ubica normalmente algún mecanismo de comprobación de errores.
Explanation:spero teyaudee
Answer:
Packet
Explanation:
A data packet is the precisely formatted unit of data that travels from one computer to another.
(Confirmed on EDGE)
I hope this helped!
Good luck <3
Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the mistake?
A) Clear the rule she created by going to the Conditional Formatting Rules Manager dialog box and deleting the rule.
B) Clear all rules that have been applied to the worksheet or selected range by clicking the Clear Rules button.
C) Use the Undo button or Ctrl+Z.
D) Right-click the area where the conditional formatting rule has been applied, and select Clear Rule from the menu list.
Answer:
its b
Explanation:
on edg
Answer:
b
Explanation:
Why might be one reason a stock becomes more valuable over time?
A. The industry is growing
B. The company is well managed
C. There’s a lot of demand on the product
D. All of the above
Select the correct answer from the drop-down menu.
Chrissie shirks the additional work given to her.
She lacks the trait of
Answer:
Responsibility
Explanation:
If you're driving a car and know there's a motorcyclist around you, you should______. A. Not change your driving B. Check your blind spots frequently C. Remind them to wear a helmet D. Make wider turns than normal
b check your blind spots frequently i guess not sure
how to take a pic with a cumputer
Answer:
Ctrl+Shift+4
Explanation:
Answer:
Use Snip+Sketch on your taskbar
It looks like this~
Justify the use of an e-diary in the organisation of the meeting.
Answer:
It can be used to easily organize stuff
Explanation: It can be easily used to organize meetings & write important stuff, and you will also never run out of pages, which is better than having no diary.
The Quick Access tool bar allows you to customize the actions or commands you frequently use.
True
False
Any application that wants to be displayed on the web must use the HTTP protocol
True
False
Answer:
true
Explanation:
Who you think is better? Ninja or TFue ,btw do you know who icebear is?
Answer:
no, no i dont think i will.
Explanation:
Which kind of a person will you be if you prove to be accountable for your actions?
Answer: You would be a person of integrity.
Explanation: Look up Integrity for details.
ABC IF U HAVE A LEGENDARY PET ON ADOPT ME OR ANYTHING COOL!! <3
Answer:
ABC PLEASE
Explanation:
Answer:
ABC i have mega owl and neon cow and mega frost <3
Which component in a CPU is responsible for transferring
data from one functional component to another?
What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
Answer:
a,b,c,e
Explanation:
Answer:
Quit your bickering in the replies on the other answer, this is correct.
Explanation:
CSS is a language that controls the way content on a web site appears. It uses_______ _____to
change the look of a page.
Answer:
I'm not sure what the answers are, but when someone is making a website from scratch, they tend to use CSS HTML and JS(javascript)
hope i helped ;)
50 PTS
in Java
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.
The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.
Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn’t in one of those Strings, then it’s an illegitimate password!
import java.util.Scanner;
public class JavaApplication46 {
public static boolean passwordCheck(String pass){
String alphanum = "abcdefghijklmnopqrstuvwxyz1234567890";
boolean legit = true;
if (pass.length()>= 8){
for(int i = 0; i < pass.length(); i++){
if (alphanum.indexOf(pass.charAt(i)) != -1 && legit != false){
legit = true;
}
else{
legit = false;
}
}
}
else{
legit = false;
}
return legit;
}
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
System.out.print("Enter a password: ");
String password = scan.next();
System.out.println(passwordCheck(password));
}
}
I hope this helps!
Question 1 (10 points)
When using MLA format your font type and font size should be what?
Question 1 options:
Rockwell 12
Calisto 11
Times New Roman 11
Times New Roman 12
Question 2 (10 points)
What tab would you go to to add citations to your paper so you can include your source information?
Question 2 options:
Insert
Design
View
References
Question 3 (10 points)
What tab do you go to to put a header on your paper
Question 3 options:
References
Insert
Layout
Home
Question 4 (10 points)
When the same word is used in multiple locations or a word is used that was not quite appropriate, a thesaurus can be used to look up a (n) ____________ or word similar in meaning.
Question 4 options:
Synonym
Homonym
Antonym
Metronym
Question 5 (10 points)
In Word you can force a page break
Question 5 options:
By positioning your cursor at the appropriate place and pressing the F1 key
By hitting the enter key twice really fast
By clicking the Insert Tab and selecting Page Break in the ribbon
By changing the font size of your document
Question 6 (10 points)
In your ruler there are two triangles. The triangle on top that points down is called
Question 6 options:
First Line Indent
Hanging Indent
Tab
Left Indent
Question 7 (10 points)
Which would you choose to save a document with a new name?
Question 7 options:
Press Ctrl+S
Click File, Save
Click Tools, Options, Save
Click File, Save As
Question 8 (10 points)
To put a ruler on your screen to help you with spacing and alignment on your paper you would go to this tab
Question 8 options:
Insert
References
Design
View
Question 9 (10 points)
User can use ______ commands to search for and correct words in a document
Question 9 options:
Copy and Paste
Find and Replace
Header and Footer
Print and Print preview
Question 10 (10 points)
What tab do you go to for the spelling and grammar check?
Question 10 options:
Home
Review
Insert
File
Answer:
Find and replace header and footer
While an image is still being editing, it is best to save it as a PDF. Group of answer choices True False
Answer:
f
Explanation:
Order the steps for accessing the junk email options in Outlook 2016
Select Junk Email Options
Click the Junk button
Select a message
Choose one of the protection levels
Locate the Delete group on the ribbon
Answer:
To access the the junk email options in Outlook 2016, follow the following steps.
1. Click the Junk Button
This will take you to the Junk messages that you have.
2. Select a message
Select a junk message from the list.
3. Locate the Delete group on the ribbon
The Junk email options is located in the 'Delete' group on the ribbon in the Home tab.
4. Select Junk Email Options
Click on the Junk email options button and a popup window will appear.
5. Choose one of the protection levels
Select the protection level you want from the various options listed including low, high, automatic etc.
Answer:
select a message, locate the Delete group on the ribbon, click the junk button, select junk email options, choose one of the protection levels.
Explanation:
The meaning of docile can be determined by the... context clue. synonym atonym or explanation
Answer:
Synonym
Explanation:
I'm pretty sure it's either synonym or explanation, but if there isn't an explanation, it's almost always synonym... so... synonym is correct.
Answer:
it is explanation
Explanation:
trust me
¿En cuales situaciones concretas se puede aplicar las técnicas de conteo(particularmente las permutuaciones y las combinaciones) dentro de la informática?
Answer:
In which specific situations can counting techniques (particularly permutuations and combinations) be applied within computer science? for anybody trying to help
Select all the lines that have a slope of 5/2
Answer:
Add a picture, then ask the question again.
Jon wants to set up a trihomed DMZ. Which is the best method to do so? A. use dual firewalls B. use a single firewall with only two interfaces C. use a single three-legged firewall with three interfaces D. use dual firewalls with three interfaces
Answer:
The correct option is C) Use a single three-legged firewall with three interfaces
Explanation:
DMZ is an acronym for a demilitarized zone.
A DMZ network is one is situated between the internal network and the Internet. It is supported by an Internet Security and Acceleration (ISA) server.
The interfaces you'd get with the DMZ network are
A public network (Internet Protocol-IP) address with a public interfaceAn internal network interface with a private network (IP) address A DMZ interface with a public network (IP) addressUnlike the back-to-back DMZ settings, a trihomed DMZ is unable to use private IP addresses. To use the trihomed DMZ, public IP addresses are a must suitable requirement.
Cheers!
A collection of computers, printers, routers, switches, and other devices
that can communicate with each other over some transmission medium
O network
O host part
subnet part
subnet
ermano envia foto de lo que necesitas yo te ayudo
what format can be applied to text in excel?
You can apply accounting format,date,numbers, currency, percentage or even fraction
The ______ is designed to store audio data on computers and/or digital music players.
A. waveform
B. audio file format
C. sample rate
D. bandwidth
Answer:
audio file formats of computer
Prepare a profile on major universities in the country Nepal
Answer:
Formal higher learning in Nepal began with the establishment of Tri-Chandra College in 1918, the first college in the country. Until 1985, Tribhuvan University (TU) was the only university in the country. The second university to be founded was Mahendra Sanskrit University. The inception of this university was soon followed by Kathmandu University in 1990, and Purbanchal and Pokhara Universities in 1995 and 1996, respectively. Many schools and colleges are run privately but none of the universities in Nepal are private.
This list includes all notable universities and colleges/campuses in Nepal. Entries are organised by courses offered, and listed in alphabetical order. Some entries that provide multiple courses may be duplicated in each of the relevant categories.
There are fourteen universities in Nepal. They are: Khwopa University (Proposed)
Agriculture and Forestry University in Chitwan
Far-western University in Kanchanpur
Gandaki University in Tanahun
Kathmandu University in Dhulikhel
Lumbini Bouddha University
Madan Bhandari University of Science and Technology
Manmohan Technical University in Biratnagar
Mid Western University in Birendranagar
Nepal Open University[1][2] in Lalitpur
Nepal Sanskrit University
Pokhara University in Pokhara
Purbanchal University in Biratnagar
Rajarshi Janak University in Janakpurdham
Tribhuvan University in Kirtipur
The university that will be profiled in their case is the Agriculture and Forestry University, Chitwan, Nepal.
The Agriculture and Forestry University, Chitwan, Nepal offers undergraduate, graduate, and PhD programs in agricultural sciences.
The university has several faculties such as the faculty of agriculture and animal sciences, fisheries, and aquaculture.
Learn more about universities on:
https://brainly.com/question/25853486
Which term means an unsecure protocol used when remotely accessing a computer?
Transmission Control Protocol (TCP)
Secure Shell (SSH)
Telnet
Internet Protocol (IP)
Answer:
9Internet Protocol (IP)
Answer:
The answer is Secure Shell (SSH)
Need answer Asap!!!! Which file type is the best choice if the image will be made into a billboard?
Answer:
A .psd file
Explanation:
Adobe photoshop files are always going to be same and there is no compression. Even better .ai files are saved into equations so you can't alter or dumb it down.
Which of the following expressions shows the correct amount of sales tax for the computer at Store A? Select all that apply.
6%($1,200)
0.6($1,200)
0.06($1,200)
One-sixth($1,200)
StartFraction 3 over 50 EndFraction($1,200)
Answer:
6%($1,200) 0.06($1,200) 3/50($1,200)
Explanation:
hope this helps sorry if i am wrong
have a nice day
Answer:
a,c,e
Explanation:
it just makes sense U^U
I need help pleaseeee
Answer:
The Answer is C. Hope you get it right, Good Luck!!!
Answer:
The answer is B
Explanation:
To create a list, paragraph, or unordered list, you should use HTML code, whereas in CSS coding, you can change the overall font size of a tag using the font-size=(number) tag.