Stream control transmission protocol (sctp) is a new _________ protocol.

Answers

Answer 1
Stream control transmission protocol (sctp) is a new IP transport protocol.

Related Questions

____ are not associated with data from the database and are used to display such things as the report's title

Answers

The answer is unbound controls.

Unbound controls do not have, or are not tied to a source of data or (such as an expression or a field) and are used to display information like pictures, static texts, lines and rectangles. An example of an unbound control is a label that displays the title of a form.



To display or distribute information from a database, programmers or database administrators create ___ .

Answers

Final answer:

To display or distribute information from a database, programmers or database administrators create reports

Explanation:

Reports are objects within a database management system (DBMS) that present data in a formatted, reader-friendly manner. The information for these reports is sourced from tables or queries within the database, known as the report's record source. Among various objects in a DBMS, such as tables, queries, and user interfaces, forms are also crucial. Forms provide an interactive interface to the data stored in the database, potentially improving data entry efficiency and limiting access to sensitive information.

A database uses a structured collection of data files managed by a DBMS. Essential tasks like the creation, storage, maintenance, and retrieval of data are facilitated by the DBMS, which can be accessed through software packages like Microsoft Access, Oracle, or FileMaker Pro. This streamlines operations for a variety of sectors, including business, government, and personal uses.

What is the difference between a form header and a page header?

Answers

A form header is always displayed on the screen of the computer. it can be useful in the display of independent information that concerns the current record. However, the page header is not displayed on the screen of computer but in every printout it is printed on the top.

If you need to use a custom theme frequently, you can save a presentation file as a(n) ____ theme file.

Answers

A theme is a coordinated set of colors, fonts, backgrounds, and effects.
An installed theme can be accessed and applied by clicking on a theme in the Themes group on the Design tab. 
If you need to use a custom theme frequently, you can save a presentation file as a(n) Office theme file.

Answer:

office

Explanation:

It is the basic documentary unit of office files and of which most of the documents are part. Administrative file means the ordered set of documents generated or produced by an office (producer) in the administrative resolution of the same matter.

It will reflect the formalization of an administrative procedure. Therefore, a file must group all the documents generated in the different phases of a procedure, from the initiation, ex officio or part, to the execution, including the documentation related to revisions, suspensions, revocations or resources that the resolution of the procedure could generate.

What technique creates different hashes for the same password? ccna routing protocols final answers?

Answers

The answer is Salted Password Hashing.  The process is similar to hashing., but with a twist. A random value is introduced for each user. This salt value is included with the password when the hash value is calculated and is stored with the user record. Including the salt value means that two users with the same password will have different password hashes.

What did research conducted in 2009 at Carnegie University Mellon predict?




Information on social networking sites can give most or all digits of a person’s social security number.


Information on social networking sites can give most not all digits of a person’s social security number.

Information on social networking sites can give only some digits of a person’s social security number.


Information on social networking sites cannot give away the digits of a person’s social security number.

Answers

A.Information on social networking sites can give most or all digits of a person’s social security number.


A number used to encrypt data is called a(n ________. signature key cookie escrow

Answers

The answer would be a key. Everything that is encrypted (unless it is 1 way encryption which is never used) requires a key. Without it, how would computers or people read the encrypted data? Good luck!

The .class extension on a file means that the file:

Answers

The asnwer is that it: is produced by the Java compiler(javac) and that it can be executed on Java Virtual Machine

The ____ command is useful when you want your shell program to automatically remove any temporary files that are created when the shell script runs.

Answers

The trap command is useful when you want your shell program to automatically remove any temporary files that are created when the shell script runs. The trap command is a basic, but a very beneficial tool. If the script generates temporary files, like a simple script that changes FOO for BAR in entirely files in the existing directory, /tmp file will be clean when you exit the script.

In the cis configuration, the methyl groups are placed _____.

Answers

Answer:

In cis configuration, the methyle group are placed on the same side of the Carbon atoms

Explanation:

Cis tran isomerism is also called transformational are term used in organic chemistry.

Cis and Trans are all latin words that means "the side of" or "the other side of".

in cis isomerism, the functional groups e.g methyl or carboxyl groups are situated on the same side of the bond. Here rotation around the bond is highly restricted.

In trans, the functional groups are located at opposite sides of the bond. This configuration allows less restriction around the bond, as opposed to cis.

Claire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of that place in her letter. Which feature of a word processing program will help Claire to remove unwanted parts of the pictures? Claire uses the BLANK option from the Format tab to remove unwanted parts of the pictures.???????????????????????? HELP ME PLEASE

Answers

what are the types of format tabs? give me some choices?

What earlier breach of childhood code can you remember?

Answers

Python,
Java Oracle
or C++ I think so.

Dead state is the name of the time delay in a cpu caused by differences between the speed of the cpu and ram.

Answers

The answer is wait state.   Dead state is NOT the name of the time delay in a cpu caused by differences between the speed of the cpu and ram.  Wait state is the name of the time delay in a CPU caused by differences between the speed of the CPU, the system bus, and memory circuits.

the four levels of administration necessary to keep human services organization operating smoothly.

Answers

The four levels of administration that is necessary to keep human services organization run smoothly are; 1. Top management, 2. Middle management, 3. Lower management,4. Operational management.

All wireless networks have their own name, referred to as the ________, which is used to identify the network.

Answers

All wireless networks have their own name, referred to as service set identifier, which is used to identify the network.

In object-oriented programming, what is a class?

Answers

Basically, a class in Object-oriented programming is a blueprint of an object. You can think of it as a concept and the object is the embodiment of that concept. It is a set of instructions to build a particular type of object and will normally define how an object will behave and what it will contain when it is instantiated.

Answer:

In object-oriented programming, a class is a blueprint for creating objects (a particular data structure), providing initial values for state (member variables or attributes), and implementations of behavior (member functions or methods).

The user-defined objects are created using the class keyword. The class is a blueprint that defines a nature of a future object. An instance is a specific object created from a particular class. Classes are used to create and manage new objects and support inheritance....a key ingredient in object-oriented programming and a mechanism of reusing code.

Given a scanner reference variable named input that has been associated with an input source consisting of a sequence of integers and an int variable named total, write the code necessary to add all the integers in the input source and place their sum into total.

Answers

Answer:

Following are the code written in the Java Programming Language.

total = 0;   //set integer type variable and initialize to 0

while(input.hasNextInt()){   //set the while loop

total += input.nextInt( );  //code is here

}

Explanation:

Here, in the following code create the reference scanner class object i.e., "input".

Then, we set integer data type variable "total" and initialize 0 in it. then, we set the while loop and pass the following condition "input.hasNextInt()". Then, we add all integer values and store their sum in the variable "total".

In this example, the program uses a Scanner to read integers from the input source (which could be the console or a file) until there are no more integers to read (input.hasNextInt() returns false).

What's the program about?

import java.util.Scanner;

public class SumIntegers {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in); // Assuming input comes from the console

       int total = 0;

       while (input.hasNextInt()) {

           int num = input.nextInt();

           total += num;

       }

       System.out.println("Sum of integers: " + total);

       input.close(); // Don't forget to close the scanner when you're done using it

   }

}

Learn more about program

https://brainly.com/question/26642771

#SPJ4

List the seven steps used by a laser printer to print a page

Answers

The seven steps used by a laser printer to print a page are :
1)  Processing, this is where he computer sends the data to the printer.
2)  Charging, where the wire (primary corona) negatively charges the
     photoconductive drum.
3)  Exposing, where the laser scans the image to the drum. Anywhere the
     laser touches the drum causes the electrical charge to drain off.
4)  Developing, where negatively charged toner particles are allowed to
     attach to the painted area of the drum; since the negative charge has
     been drained off these areas
5) Transferring, where the transfer corona wire charges the paper with a
     positive charge from behind. The negatively charged toner jumps to the
     positive paper, according to the image on the drum. A Static Charge
     eliminator then removes any residual charge.
6) Fusing, where the toner particles attached to the paper are fused or
     melted to the paper, because of the heated drum.
7) Cleaning, where the drum is cleaned of excessive toner and electrical
    charges.

How do you work out a lookup and an if function on an excel spreadsheet?

Answers

In column A, put the codes of the products to look up. In column B, put the product name. In column C, put the price.

To create a windows to go workspace on a usb drive, which minimum size usb drive is required?

Answers

4go but to create windows you'll need media creation tool don't worry it's free using that you can upgrade the same computer but still you'll need a product key but there's a way to bypass that using kmspico there's tutorials on YouTube so you have to click activate later Hope that helped

A good way to present several types of related data in a document is to use __________.

A. Row
B. A resume
C. A table
D. A text book



Answers

C- Table
I hope this helps! :)

C. A TABLE

Have a nice day!

what is the ability to carry out financial transactions using mobile devices such as tablets and phones?

Answers

Mobile banking is the ability of making financial transactions on a mobile device (cell phone, tablet, etc.) anytime, anywhere.The disadvantage for this kind of activity is the security concerns. Creating a secure connection is important or else a client might risk his personal information being jeopardized.

Which group on the sparkline tools design tab would you choose if you wanted to change the data source of the sparkline? (1 point) type sparkline style show?

Answers

The answer is (B) Sparkline

Sparkline is a feature in MS Excel that enables you to see trends within your data at a glance. Once the procedure is followed to create a Sparkline, you can change the Sparkline’s data source. To do this, you need to select the Sparkline cell and go to the Sparkline tools tab. You can proceed to click on Design - Sparkline - Edit Data - Edit group location and data/ Edit Single Sparkline’s Data option.

Answer:

I believe the type is line but that's all I know sorry :(

A class's ____________ are the statements that define the class's fields, properties, and methods.

Answers

Class Member Declarations

For film editors, which task comes last in their workflow pattern?

editing

rendering

digital grading

color correction

Answers

B. Rendering
Hope this helps
B. Rendering absolutely for sure

The smallest storage location in a computer's memory is known as a _____.

Answers

The answer would be a Bit.

what is a core in computer

Answers

Hey there, this isn't really my part of town, I'm what you call a math freak, but here.

In relation to computer processors, a core is the processing kinda like a brain we ppl have, this is the unit that receives instructions and performs calculations, or actions, based on those instructions like when you click something. A set of instructions can allow a software program perform a specific function. Processors can have a single core or multiple cores that do many different things.
Hopefully i helped you, please mark brainly if possible.
Mark her brainiest now it needs 2 answers to mark brainiest so do it thank you

Which remarketing audiences can be defined in google analytics? (select all that apply)?

Answers

The remarketing audiences that can be defined in google analytics are :     
1) Users who played a video on your website
2) Users who purchased a product on your website
3) Users who visited a specific page on your website

As an ethical hacker you are capturing traffic from your customer network with wireshark and you need to find and verify just smtp traffic. what command in wireshark will help you to find this kind of traffic?

Answers

The answer is: tcp.port eq 25

To convey points effectively on a slide, follow the

Answers

Follow the one-by-six-by-six rule (1-6-6) rule

This presentation rule in PowerPoint suggest that you should only have one idea per slide and include no more than six bullet points per slide and no more than six points per line. The goal for this rule is to avoid your slide from being so dense and packed with too much info.



Other Questions
expressions equivalent to 4 square root 5 Melody's grandmother takes her to the park every wednesday evening and visits her on weekends. despite being close to melody, she stays out of decisions that melody's parents make with regard to her well-being. melody's grandmother shows an example of a(n) ________ grandparenting style. The study of energy and its changing form is called ___ Simple interest is calculated on the principal in an account using the formula I=prt. How much simple interest does $3,500.00 earn in 6 months at an annual interest rate of 2.5%? What is a charestic of an electromagnetic wave? How many outcomes are there for the event of rolling a 6-sided number cube and then spinning a 4-part spinner? Given the system of inequalities below: -3x - y < 12 and 2x + 3y 9 The Purpose of the Berlin Conference was to divide ___________ between ________ countries. The equation of a circle is x2+y2-6y+1=0 what are the coordintes of the center and the length of the radius The area of a rectangle is represented by the expression 6x^3y^5. Which of the following could be the dimensions of the rectangle?2xy^2 and 3x^2y^32xy^2 and 4x^2y^32x^3y and 3y^42x^3y and 3xy^4 A bucket contains 50 lottery balls numbered 1-50. One is drawn at random. What is the probability that it is a multiple of 6 given that it is a 2-digit number? HELP ASAP WILL GIVE BRAINLIEST How does the extinction of a species affect humans ? A. Extinction contributes to the loss is natural food sources. B. Extinction generates new sources of medicineC. Extinction helps keep air and water clean D. Extinction makes the environment more pleasant Read the excerpt below from the introduction to the book Access to the Genome: The Challenge to Equality and answer the questions that follow. As genetic technology and other technologies relevant to human biology are developed, society will face a host of complex ethical, legal, and social issues. One of the most complex sets of issues involves our choices over who will have access to these technologies. . . . If, indeed, diseases can be cured or prevented, and if embryos can be selected or enhanced, but the technologies are not available for all to have [due to affordability], how will our society respond? What does justice require, and what will political realities permit?The issues surrounding how to distribute access to new genetic technologies are the focus of this book. These questions and problems are not newwe struggle now with the fair allocation of vital health care resources in a society marked by great discrepancies in wealth. But genetic technologies will dramatically up the ante as the menu of powerful possibilites expands. With the possible exception of slavery, these technologies represent the most profound challege to cherished notions of social equality ever encountered. Decisions over who will have access to what genetic technologies will likely determine the kind of society and political system that will prevail in the future.Before discussing the social and moral issues raised by these questions, we will first provide some background information on the genetic revolution itself. In the next chapter, we describe the massive effort to decode the human genetic recipe. In Chapter Three, we describe the technologies that this effort is likely to produce and the potential benefits that they will provide. Then we will embark on a discussion of the social and ethical problems that these technologies pose and, finally, discuss potential solutions. (Mehlman 6)Mehlman, Maxwell J. Access to the Genome: The Challenge to Equality. Washington, DC: Georgetown U Press, 1998. Print.Is this a primary or secondary source? Would the information covered in this book be more relevant as a primary source or secondary source? One object has a charge of +5.0 10-6 c, and a second object has a charge of +2.0 10-6c. the objects are 0.5 meters apart. what is the electrostatic force between them? A stack of cards is numbered 1 to 21. Kelly pulls one card from the stack. What is the best approximation for the probability that the card is an even number5%, 21%, 48%, or 52%Please help Asap Who does nick and gatsby run into as they are leaving the restaurant? Which of the following effects of a BAC of .2 percent does NOT relate to ones driving ability?impaired gross motor skills such as walking or gestureslack of coordinationimpaired reactionsbreathalyzer test results indicating a high BAC What law was passed in 1947 to monitor the activities and powers of the labor unions in the United States.? Which equation is the perpendicular bisector of the line segment with endpoints (-2,4) (6,8)