which type of ethernet framing is used for TCP IP and DEC net​

Answers

Answer 1
Ethernet II
Trust me u will get it right

Related Questions

Please help my daughter needs to pass this

Answers

Answer:

Tab

Space = | | one space in between

Tab in a standard document = |     | five spaces in between

Hope this helps. Have a nice day.

Nicolai wants to add demand-based content to his Website so that customers can access the information at their behest. Which audience-development technique describes the process Nicolai wants to implement?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Visitor tracking
B

Push technology
C

Pull technology
D

Search Engine Optimization (SEO)

Answers

Answer:

The audience development technique that best describe the process Nicolal wants to implement is;

C Pull technology

Explanation:

Pull technology is a form of network mode of communication in which the initial data request comes from the client side of the network for it to be handled by the server side of the network.

Given that Nicola wants a demand-based content to his website for customers to access information when they wish to, the process is similar t the podcasting in which each new content is posted to a specific RSS feed from where it can be requested by a mobile app, directory or a RSS feed reader

The counter technology is a push technology where the servers push content to intended clients, such as for an incoming call, instant messaging, synchronous conferencing (online c h a t) and files.

Which of the following is a method of relationship management for an e-commerce Website?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Providing an automatic order tracking facility to customers
B

Requiring users to submit orders by telephone
C

Using validated HTML5 code
D

Performing Website maintenance

Answers

Answer:

if u find out can u lmk pls? j have a very similar question and I've been stuck for a min

Question :
What is the term that refers to the specific techniques used to increase a Webpage's or site's rank on a search engine?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Pay per click (PPC)
B

On-site Web analytics
C

Off-site Web analytics
D

Search engine optimization (SEO)

Answers

Answer:

D

Explanation:

Search engine optimization (SEO)

What is the usual price of smartphone apps?

Answers

0-20 dollars

that's the usual cost for apps

and for phone it's cost

RS 32,000 Nepali rupes

you can convert it by dividing it by 110

and you will get price in dollars

hope it helps you ❣❣

Mark me as brainliest

The last programming statement in a Java program is the class statement.


true

false

Answers

Answer:

False

Explanation:

Hope dis helps

It’s is false :) hope you pass your test

In Excel, how many columns can be filtered at a time?

Answers

Answer:

When you apply the Filter function, after filtering one column, the next columns will be only filtered based on the result of the previous filtered column. It means that only AND criteria can be applied to more than one column.

Explanation:

Hope it helps you!

Is Conflict Healthy ?

Answers

yes

Explanation:

because it has more things

No not really I mean I don’t think so but other people might have other Pennies

You misplaced your company ID badge. Unfortunately, you had just changed your password and taped it to the back of the badge. It would not be difficult for someone to guess your user ID. With those two pieces of information, someone could access the files you have permission to work with, change the data stored there, delete files, or alter the access to the files. Which of the following is at risk in this scenario?

a. The confidentiality of the data
b. The integrity of the data
c. The accessibility of the data
d. None of the above

Answers

Answer:

a

Explanation:

what is a client server network and its features?​

Answers

Answer:

A client-server network is the medium through which clients access resources and services from a central computer, via either a local area network (LAN) or a wide-area network (WAN), such as the Internet. ... A major advantage of the client-server network is the central management of applications and data.

Write the syntax.

1. for loop

2. while loop

3. function definition

4. function call

5. do while loop​

Answers

Answer:

Explanation:

The following syntax's are written in Python and perform a very basic arithmatic operation within the loop of call as an example

1.    for x in range(3):

       print(x)

2.    count = 0

      while True:

          print(count)

          count += 1

          if count == 4:

              return False

3. def next_pow2():

       return 3**2

4. next_pow2()

5. i = 1

while True:

   print(i)

   i = i + 1

   if(i > 3):

       break

#Python doesn't have an explicit do-while loop but can be emulated exactly as a do-while loop using the format written in answer 5.

Which of the following is a primary disadvantage of using a GUI HTML editor to develop your Webpages?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

It takes longer to develop pages with a GUI HTML editor than to write code manually.
B

Development options may not include code standardized by the W3C.
C

The code will render only on browsers developed by the GUI HTML editor's manufacturer.
D

GUI HTML editors offer very few design options for Webpages.

Answers

Answer:

C (Most feasible option)

Explanation:

I am not sure but option C seems most probable, all other options do not seem to be true


when should you stop where you are, drop to the
cover your face with your hands, and roll over and over?
A
if you burn a stump
B
if your clothes catch fire
if you draw a cool bath
if your top layer of skin is damaged

Answers

Answer:

A . if you burn a stump because if u roll over the fire will have a 90% chance of going out

Recently, Suzette has been late for meetings. Sometimes she is more than thirty minutes late. Suzette's behavior shows she does not
demonstrate which workplace attitude?
•honesty
•self confidence
•dependability
•punctuality

Answers

Answer:

punctuality

Explanation:

to be punctual is to be on time

How many triangles can you make if the side lengths are 4 cm, 5 cm, and 11 cm?

Answers

i would think you could create infinity triangles but the triangle you are describing is obtuse

Write program to read 10 random numbers, then find how many of them accept division by 4,
5, and 6.
The program should print the output like this:
There are numbers accept division by 4
There are ------ numbers accept division by 5
There are ------ numbers accept division by 6
Help me guys with this question

Answers

Answer:

In Python:

import random

di4 = 0; di5 = 0; di6 = 0

for i in range(10):

   num = random.randint(1,100)

   if num%4 == 0:

       di4+=1

   if num%5 == 0:

       di5+=1

   if num%6 == 0:

       di6+=1

print("There are "+str(di4)+" numbers accept division by 4")

print("There are "+str(di5)+" numbers accept division by 5")

print("There are "+str(di6)+" numbers accept division by 6")

Explanation:

This imports the random module

import random

This initializes the count of division by 4, 5 or 6 to 0

di4 = 0; di5 = 0; di6 = 0

This iteration is repeated 10 times

for i in range(10):

This generates a random number

   num = random.randint(1,100)

Check if number is divisible by 4. If yes, increase div4 by 1

   if num%4 == 0:

       di4+=1

Check if number is divisible by 5. If yes, increase div5 by 1

   if num%5 == 0:

       di5+=1

Check if number is divisible by 6. If yes, increase div6 by 1

   if num%6 == 0:

       di6+=1

Print reports

print("There are "+str(di4)+" numbers accept division by 4")

print("There are "+str(di5)+" numbers accept division by 5")

print("There are "+str(di6)+" numbers accept division by 6")

7. Develop an algorithm using pseudocode to show whether a given number is even or odd

Answers

Answer:

Calculate the remainder after division by 2If remainder is 0, number is even, odd otherwise

plz help asap

Question # 2
Multiple Select
Employees are one of the main contributors to cybersecurity breaches because of _____? Select 3 options.

software bugs

negligence

lack of knowledge

inattention

malware

Answers

Answer:

I'd say negligence, lack of knowledge and inattention

You need to pay an Internet Service Provider (ISP) for services rendered. Which payment technology would you use?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Secure Sockets Layer (SSL)
B

Payment gateway
C

Transport Layer Security (TLS)
D

Electronic Funds Transfer (EFT)

Answers

Answer:

D. Electronic Funds Transfer (EFT)

Explanation:

e-commerce is a short for electronic commerce and it can be defined as a marketing strategy that deals with meeting the needs of consumers, by selling products or services to the consumers over the internet.

This ultimately implies that, e-commerce is strictly based on the buying and selling of goods or services electronically, over the internet or through a digital platform. Also, the payment for such goods or services are typically done over the internet such as online payment services.

A payment gateway can be defined as a merchant service technology used for the capturing, acceptance and transfer of digital payment from the bank account of a customer (buyer) to the bank account of the merchant (seller). Thus, payment gateway typically involves the use of credit or debit card for the payment of goods purchased or services provided.

In this scenario, you need to pay an Internet Service Provider (ISP) for services rendered. Thus, the payment technology which you would use is Electronic Funds Transfer (EFT).

You are developing a Website that is going to be viewed extensively on smartphones and tablets. Which of the following should you implement when developing for mobile devices?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Increase margins and padding to make the text on the mobile device screen easier to read.
B

Avoid using heading tags to build the structure of the page and to style text.
C

Do not label form fields to avoid unnecessary verbiage.
D

Always use the alt attribute in your tags.

Answers

increase margins and padding to make the text on the mobile device screen easier to read is the answer. i will answer by typing the whole answer cause i dont want you to get mixed up

One advantage of the Second generation of programming language is that it is machine dependent. True or False

Answers

Answer:

I THINK FALSE

Explanation:

2. Android 1.1 was internally referred to as _________.



3. A large C program is divided into basic building blocks called as _________.



4. __________ are the in-built function in C programming system.



5. ______________ are special variables which can hold more than one value using the same

variable, using an index​

Answers

Answer:

2. petit four

3. function

4. library functions

5. array

Question :
An end user has just clicked the OK button on a Web document to send information to the Web server. Which of the following contains a reference to the CGI script that allows this Webpage to send information to a Web server?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

A database
B

A Web server application
C

A Web form
D

ASP

Answers

C because it’s really strong

Program C++ I need help!

Answers

Answer:#include <iostream>

using namespace std;

int main()

{

   int factorial = 1;

   for (int i = 5; i > 0; i--) {

       factorial = factorial * i;

   }

   cout<<factorial;

   return 0;

}

Explanation:

5.In the DNS rebinding attack, if the victim’s browser caches the IP address for any hostname used in HTTP requests for an hour, can the attack still be successful? Why?

Answers

Well the awnser that you are looking for is not here and I am verry sorry about that I just need points for my awnser

on React
1) Create counter and an increment button, default value of the counter would be 1, clicking on increment button adds 5 to the counter. The max value of the counter would be 20, after reaching this value , counter would not increment. Add a reset button which would set the counter value to 1.
[8:53 PM]
2) Create a button with label “true” , clicking on the button toggle the value from “true” => “false” and “false” => “true”.(edited)

techsith (patel) — 03/03/2021
3) Create a counter and a button. clicking on the button increments the counter by one. double clicking on the button resets the counter to 0

Answers

Answer:too many words ahhh

Explanation:

(assuming jsx)

function Buttons (props) {

return(

{props.counterValue}

counter

increment

reset

);

}

var counterValue = 1;

function addup(a){

if(counterValue + a <= 20){

counterValue += a;

} else if (counterValue + a > 20){

//do nothing

}

ReactDOM.render(

 ,

 document.getElementById('root')

);

}

function reset() {

counterValue = 1;

ReactDOM.render(

 ,

 document.getElementById('root')

);

}

Why don't hurricanes form in the oceans in northern latitude of the world?

Answers

No Earth Rotation (left) vs Earth Rotation (right) and resultant Coriolis force. ... This is why there is no Coriolis force at the equator and why hurricanes rarely form near the equator. The Coriolis force is simply too weak to move the air around low pressure. Air prefers to flow from high to low pressure.

swapping as applied in memory management with an aid of a diagram​

Answers

Answer:

what do i help on?

Explanation:

Given a Student class, create a class with following characteristics: The class name should be ClassRoom. Private variable students array to maintain the list of Student objects. Function addStudent with input parameter name (string) and rollNo(int) adds a new student in "students" list. Method getAllStudents should return all the students in ClassRoom.
Input Jack Jones Marry where, First & Second line represent a student's name and roll number. And so on Output 1 Jack 2 -Jones 3-Marry Assume that, Maximum "students" count can be 10.
Below is the code for the driver class - DriverMain.java
import java.util.*;
//Your program will be evaluated by this DriverMain class and several test case
public class DriverMain {
public static void main(String[] args) {
String name;
int rollNo;
int n = 0;
Student[] students = new Student[10];
ClassRoom classRoom = new ClassRoom();
Scanner input = new Scanner(System.in);
while(true){
name = input.nextLine();
if(name.equals(""))
break;
rollNo = Integer.parseInt(input.nextLine());
classRoom.addStudent(name, rollNo);
n++;
}
students = classRoom.getAllStudents();
for (int i = 0; i < n; i++) {
if(students[i]!=null)
System.out.print(students[i].getRollNo() + " - " + students[i].getName());
if (i < n - 1)
System.out.println();
}
}
}
//Below is the code for the Solution.java
// NOTE - THIS IS WHERE YOU WRITE THE CODE
import java.util.*;
class Student {
private String name;
private int rollNo;
public String getName() {}
public void setName(String name) {}
public int getRollNo() {}
public void setRollNo(int rollNo) {}
};
class ClassRoom {
private int i;
private Student[] students;
public void addStudent(String name, int rollNo) {
// WRITE YOUR CODE HERE
}
public Student[] getAllStudents() {
// WRITE YOUR CODE HERE
}
};

Answers

Answer:

Answered below

Explanation:

//Implementation of the addStudent method

public void addStudent(String name, int rollNo){

Student newStudent = new Student();

newStudent.name = name;

newStudent.rollNo = rollNo;

student.add(newStudent);

}

//Implementation of the getAllStudents method

public Student[] getAllStudents(){

return students;

}

Database Management Systems are featured with:

Question 3 options:

The facility to easy editing, spelling check, auto pagination, lay out and printing reports


The ability to store large amount of data to facilitate easy update, sort and retrieval


The ability to calculate efficiently with the help of built-in functions and analyze


None of the above

Answers

Answer:

Answer: Database Management Systems are featured with:​ The ability to store a large amount of data to facilitate easy updates, short, and retrieval.

Explanation: I took the test

Other Questions
A geometric sequence has an initial value of 2 and a common ratio of 3. Which formula would be more practical to use if you were looking find the value of the 19th number in the sequence? Select the real words which can be formed with norm. For each of the following solutions, state whether the solution is saturated, unsaturated or supersaturated in the following conditions: A) at 30o C, 70 g of KNO3 is dissolved in 100 g of water ________________________________ B) at 20 oC 0 g of KClO3 is dissolved in 100 g water________________________________ C) at 100 oC , 30 g of NaNO3 is dissolved in 100 g of water_____________________________ D) 50 g of NH4Cl at 70o C is dissolved in 100 g water. ________________________________ HELP THIS IS DUE IN 20 MINUTES who is this and what was there most important accomplishment? Write a paragraph explaining your answer. What technology helped spread the spark of inquiry and learning during the Renaissance? This led to more literacy, more books being published in the vernacular, on secular subjects, etc. 7/10 is what percent of 7/8 PLEASE HELP! 20 POINTS + BRAINLIEST WILL BE GIVENJim is hoping that a park will be built within 5 miles of his house. If a park is built at the coordinates (12, 10), does that meet Jims criteria? Explain. If you spin the spinner 11 times, what is the best prediction possible for the number of times it will land on yellow?yellow:4green:3pink: 4 x^2 + 3x^2 + 4 - 3 help Which characteristic describes one way a gang is identified?the ages of people who belong to a groupthe type of homes that people in a group ownsymbols that group members use to identify who they arethe type of criminal activity that group members engage in define the pythagorean theorem I need help with these questions can someone help me please? write a properly capitalized sentence about a specific ray gun brand Question 7 (5 points)Who owned most of the land in France and paid very little taxes before the revolution?aThe Third EstateOThe First EstateThe Second Estate Tom described a certain phase in mitosis as follows: The centromere splits. The paired chromosomes separate and shift to the opposite sides of the cell, which stretches the cell. Which of the following phases will take place just after the phase described by Tom? Anaphase Metaphase Prophase Telophase!!!PLEASE HELP!!! HELP ASAP!! WILL gIVE BRAINLIEST Which statement best explains the effectiveness of the conclusion paragraph? Drag each label to the correct location on the image.Match the various personal care service professionals to the appropriate images. The 4 walls and ceiling of a room measuring 20 feet by 30 feet by 10 feet high are to be painted with a special paint that is applied to a depth of 0.001 inches per coat. A gallon is 231 cubic inches. To the nearest gallon, how many gallons of paint are required for two coats on the walls and ceiling? 3|4x-9=27how to solve this EMERGENCY PLEASE HELPA company deposits $5,000 in a bank account that earns 3%compound interest each year. Which function represents the value,V(t), in dollars, of the bank account after t years?