To what would you compare the transport layer?
A. Data links
B. The post office
C. Driving a car
D. A train

Answers

Answer 1
The answer is (B) The Post Office.

In layman’s terms, transport layer is similar to the post office functions of delivering parcel and letters and the agreed delivery deadlines. It also notices any dropped info and re-transmits it. Just like the post office, the transport layer directs messages and information between specific end users. If by mistake you write a letter to the wrong person, the letter will be returned and the postal employee will stamp it as address unknown.



Answer 2

Answer:

The answer is Post office

Explanation:

Got it correct on edge 2021


Related Questions

what is the relationship between ionic bonds and cleavage

Answers

Hello there!

The relationship between ionic bonds and cleavage is: As the ionic bond strength increases, cleavage will be more difficult. 

Minerals are held together generally by ionic bonds. Ionic bonds are the result of electrostatic attraction and electron transfer between positive and negative ions (cations and anions). Ionic bonding implies the formation of ordered crystalline solids and the cleavage of those solids will depend on the strength of this bonding. 

Dan is a Civil Engineer for a company that builds nuclear power plants throughout the world. Which best describes the places he works and what he does there?

Answers

Answer:

the answer is c

Explanation:

Answer:

C. in a laboratory, where he designs power plants, and in a factory where the plants are manufactured

Explanation:

A text-only forum accessed through a bulletin board service (BBS) is known as a _____.

Answers

Answer:

newsgroup---for apex

Final answer:

A text-only forum accessed through a bulletin board service is known as a discussion board, a precursor to modern internet communication systems.

Explanation:

A text-only forum accessed through a bulletin board service (BBS) is known as a discussion board. In the infancy of the internet, bulletin board systems were an early form of online communication.

These systems were pre-internet computer networks that connected personal computers using modems and phone lines. Users of BBS could share files, post messages, engage in discussions, and even play text-based games.

The significance of BBSs at the time is comparable to the modern-day impact of the European Union (EU) on trade or climate change on environmental policies - they transformed their respective fields.

Raul looks at different technologies that will help him do his job. What part of the process is this?

analyzing options
determining the goals
evaluating the decision
gathering data

Answers

This process is known as analyzing options. When Raul looks over different options and/or technologies that will help him do his job, he is going over the different options and seeing which option is best for him. When deciding which is best for him, he will need to consider: what Raul needs it to complete, how each technology option compares to the next, the price point and all of the functions the technology can do. After he figures out what it can do compared to what purpose he needs it to serve, he can determine the best option for himself.

This portion of the process is actually called gathering information.

I tried the other option on Odesseyware and got it incorrect.

I hope this helps!

Which of the following would most directly affect the operations of the digestive system

Answers


The answer:
The heart

Explantion:
Decreased blood flow can cause decreased motility in the gut causing nausea, lack of appetite, ineffective digestion and malabsorption of nutrients. Decreased blood flow can also cause stress on the gut and result in gastric ulcer formations.

Each​ _____ in a relational database table is a unique record of something that users want to track.

Answers

Database is a self-describing collection of integrated records.
Each​ key in a relational database table is a unique record of something that users want to track. The key is a column or group of columns that identifies a unique table row  and establish relationships between tables and within a table. 

The data in a database management system that identifies the names of​ tables, fields in each​ table, and the properties of each of the​ fields, as well as which fields are primary and foreign​ keys, etc. is called​ ____________.
a. data definitions
b. metadata
c. qualitative data
d. descriptive data
e. uberdata

Answers

The answer is (B) Metadata

By definition, Metadata describes other data or data about other data. In simple terms, it provides context for data. In DBMS, metadata defines attributes and data elements like data type, name, size, and etcetera. It also defines data that could be about records and structures like columns, length and fields.


B. Metadata is correct answer

Imposing stricter recycling regulations would greatly benefit our city in many ways.

Which is the best revision of the underlined portion of the sentence?
would be a totally beneficial thing to do.
would be great and I’ll tell you why.
would be pretty great for our city for many reasons.
no change

Answers

The answer is (D) no change

Given that there is no underlined portion of the sentence, we cannot completely answer this question. However, basing on the excerpt borrowed from Erika’s letter to her mayor, I honestly would not change anything. Given that Erika is addressing the mayor about a serious issue, The sentence’s choice of words is correct and sounds very academic, professional and formal, something that Erika would want to achieve.



Answer:

(D) no change

Explanation:

To modify a text box, shape, or SmartArt graphic, the user must first select the _____.

Answers

Final answer:

To modify a text box, shape, or SmartArt graphic, the user must first select the object, enabling access to specific formatting and editing tools appropriate for the item, such as the SmartArt Tools Design and Format tabs, Drawing Tools for shapes, and text layout options for text boxes.

Explanation:

To modify a text box, shape, or SmartArt graphic, the user must first select the object. This initial action grants access to a range of formatting and editing tools tailored to the selected item. For example, upon choosing a SmartArt graphic, the SmartArt Tools Design and Format tabs become available, offering numerous layout, style, and color options. Similarly, selecting a shape enables the use of the Drawing Tools, which provide capabilities to fill, align, group, and modify the shape's appearance. When it comes to text boxes, activating one allows the user to adjust the text layout, remove or format the border, and other text-specific modifications via the contextual tab or the Format Shape option.

SmartArt graphic: Customized through SmartArt Tools Design and Format tabs for layout, style, and colors.

Shapes: Modified via the Shapes drop-down list for advanced formatting like filling, aligning, and grouping.

Text boxes: Adjusted for text display and border through the Format Shape option or Layout Options icon.

The unique constraint differs from the primary key constraint in what way?â

Answers

The following question has multiple choices as follows

a. The UNIQUE constraint ensures that a specific condition is true before a data value is added to a table.

b. The UNIQUE constraint can be created at either the column level or the table level.

c. The UNIQUE constraint allows NULL values.

d. The UNIQUE constraint does not allow NULL values.

The answer is (C) The UNIQUE constraint allows NULL values.

The unique constraint differs from the primary key constraint in that it allows Null values. Primary key is not nullable while Unique constraints may be nullable. If for instance you try to make a nullable column as your primary key, SQL server will first convert it into a NOT NULL and then create the primary key.

6. How does understanding terminology’s structure and construction help you to understand medical terms?

Answers

This helps one to fully understand what the doctor is saying and by you understanding this, it can be of great importance. You can explain everything properly to the patient what the doctor is talking about. Everything can be broken down in normal English setting about what the doctor wrote.






Which type of loop is best if you do not know how many times you need the loop to run?

Answers

while:  the loop must repeat until a certain "condition" is met.  If the "condition" is FALSE at the beginning of the loop, the loop is never executed.  The "condition" may be determined by the user at the keyboard.  The "condition" may be a numeric or an alphanumeric entry.  This is a good, solid looping process with applications to numerous situations. 
while:int ctr = 1;
while (ctr < = 20)
{
     cout<< ctr++ <<"\n";
}



HOPE i HELPED! brainliest? :D 

On the attendance worksheet, in cell l5, enter an if function to determine if the percentage in cell k5 is greater than or equal to the goal in cell h18. the function should return the text goal met if true and review if false. set the reference to cell h18 as an absolute reference

Answers

You have tot do these steps:
Ribbon
1.Click cell L5. On the FORMULAS tab, in the Function Library group, clickthe Logical, and then click IF.
2.In the Function Arguments dialog box, with the insertion point in the Logical_test box, type K5>=$H$18.
3.Press TAB to select the Value_if_true box.
4.Type Goal Met.
5.Press TAB to select the Value_if_false box.
6.Type Review.
7.Click OK.

Keyboard
1.Click cell L5, and type =IF(K5>=$H$18,"Goal Met","Review") (or =if(k5>=$h$18,"Goal Met","Review") or =IF($H$18=0.8,"Goal Met","Review") or =if(k5>=.80,"Goal Met","Review") or =IF(0.80
2.Press ENTER (or TAB or CTRL+ENTER or click the Enter button to the leftof the Formula Bar).

Keyboard (2)
1.Click in the Name box, type l5 (or L5), and then press ENTER. type =if( (or =IF( or =If().
2.Click cell K5, and then type >=.
3.Click cell H18, press F4, and then type ,"Goal Met","Review".
4.Press ENTER (or TAB or CTRL+ENTER or click the Enter button to the left of the Formula Bar).

Which of following allows you to share a file with someone that is too large to send via e-mail?
Dropbox
Google Drive
One Drive
All of the above

Answers

One can share files via email that is too large by drop box, g drive, and one drive. The correct option is D.

What is a drive?

A drive is a location (medium) that can store and read information that cannot be easily removed.

All drives contain files and programs that your computer uses. When you write a letter in a word processor, for example, the program is loaded from the drive.

When you need to send large files via email but they are too large, one of the more efficient solutions is to use cloud-based storage services.

Cloud storage services such as Mail Drop, OneDrive, and G Drive are excellent options for sending large files via email.

Thus, the correct option is D.

For more details regarding drive, visit:

https://brainly.com/question/966908

#SPJ5

When using an online media source, students should ensure the information is

Answers

viable and true. hope this helps!
relevant, credible, and valid.

Which theory uses game playing to understand the development of self?

Answers

Mead's role-playing theory uses game playing to understand the development of self.
According this theory game is one of the three activities through which the self is developed, The other two are language and play.  Through these activities people interact with other people and  develop self-images.

How do you make a tip calculator out of code. getting the cost of 3 guests food and the tip % and calculating the total bill.

Answers

You have to multiply 3 costs of food by 3 then you multiply it by the % of tip.

What are two best practices for discovering whether a message you’ve scheduled with Hootsuite has failed to send?

A) Download a 'Past Scheduled' report from Hootsuite Analytics, and cross-referencing it with posts actually published on your social properties
B) Review Past Scheduled calendar view in Publisher for entries colored red
C) Regularly check Publisher's 'Rejected' Tab
D) Enable email notifications for failed messages under Preferences

Answers

I think:
 C)  Regularly check Publisher's 'Rejected' Tab  D)  Enable email notifications for failed messages under Preferences

But I am not sure.

Answer:

B & D

B) Review Past Scheduled calendar view in Publisher for entries colored red

D) Enable email notifications for failed messages under Preferences

Explanation:

Hootsuite application is a social media management system scheduling tool. It use to manage and keep track of one's social media network channels, to monitor people's comments and reviews about your brand and enable you to respond immediately. The two best practices for discovering whether a message you have scheduled with hootsuite has failed to send are:

i) Review Past Scheduled calendar view in Publisher for entries colored red

ii) Enable email notifications for failed messages under Preferences

What is the exact number of bytes in a system that contains 6.4 bytes?

Answers

I believe this question should be; What is the exact number of bytes in a system that contains 6.4 Gbytes?

1 Gigabyte = 1,073,741,824 bytes 

How about 6.4 Gb = X?

X = (6.4 Gb×1,073,741,824 bytes) / 1 Gigabyte

X = 6,871,947,674 bytes

 

Camile uses specialized equipment designed by Olivia to analyze and predict weather and atmospheric changes. Which describes the career pathways of Camile and Olivia?

Answers

Camile   can go into Meteorology.
Olivia  should go into  engineering

answer

Olivia is in the Engineering and design pathway and Camille is in the science and meteorology pathway.

Explanation

engineering and design path way- this is a methodological series of steps that are used by engineers in creating functional products and processes.

science and methodology pathway- these are steps used by scientists to create explanations based on the evidence which they have gathered.

All spreadsheet formula should start with

Answers

A formula in Excel will ALWAYS start with = then the function name like
=SUM(A1:A5)

How can you tell the difference between subnet addresses and interface addresses?

Answers

The network interface address is an network address  that belongs to an interface and defines that interface in the network. Any device with an IP Address, has an IP Address on an interface. The subnet address (or subnet mask) on the other hand defines the routing prefix of an address and divides the IP address into network and host addresses. 
There can be same subnet addresses, but the interface address must be unique defined.
Final answer:

Subnet addresses are used to divide a network into smaller subnetworks, while interface addresses are used to identify specific devices or interfaces on a network.

Explanation:Difference between subnet addresses and interface addresses

In networking, subnet addresses and interface addresses serve different purposes.

A subnet address is used to divide a large network into smaller subnetworks, allowing for better organization and management of network resources. It is a range of IP addresses that share the same network prefix and subnet mask. For example, in the IP address 192.168.0.0/24, 192.168.0 represents the subnet address.

An interface address, on the other hand, is used to uniquely identify a specific device or interface on a network. It is a unique IP address assigned to a network interface such as a network card or router interface. For example, an interface address could be 192.168.0.1.

"explain why professional software is not just the programs that are developed for a customer"

Answers

To put it into simple terms, software is always a continuous process of coding and updating, thus, you will never code and be done. Professional software not only consists of programs that are developed for a client, but also the compilation of documentation, configuration of data, support websites, requirements, design manuals, and evolution to make these programs operational and complete. 

A professionally done software system consists of more than one program and configuration files used to set up these programs.






Your boss, kelly, tells you that the users have approved your data model and that you can go ahead and create database structures such as tables. you begin developing the tables for your database and realize that you need to design your table structures so that data integrity is protected. you recall that a process called normalization is used to improve data integrity. what is the best way to normalize this data?

Answers

The best way to use data normalization in this example is to use a third normal form (3NF). The third normal forms is in the second normal form and does not have a transitive functional dependency. Since it does not have a transitive dependency, there is no data duplication and it achieves referential data integrity




What do the concepts of data warehousing and data mining mean?

Answers

The term data warehouse denotes a group of databases that work together, which means enables integration of data between different databases. The data warehouse is a source of the data that is used for example in  the process of discovering interesting and useful patterns and relationships in large volumes of data. This process is called data mining.

Data warehousing involves collecting and managing large volumes of data, while data mining is used to discover patterns and insights from this data. Metadata, resolution, accuracy, and interoperability are key when evaluating data for analysis. Standardization is crucial for effective data retrieval and analysis.

Data warehousing is the process of collecting, storing, and managing large volumes of data from various sources in a central repository. Its purpose is to consolidate disparate data into a single, coherent database for efficient querying and analysis. On the other hand, data mining is the technique of discovering patterns, correlations, and insights from large datasets through statistical and computational methods. It forms part of a broader process of knowledge discovery in databases (KDD) and can include predictive analytics, which anticipates future trends and behaviors.

Key Concepts in Choosing Data for Analysis

Resolution: The level of detail within the data.Accuracy: The correctness and reliability of the data.Interoperability: The ability of the data to integrate and function with other datasets.

All these factors are part of metadata, which is essential for understanding the context and quality of the data. Metadata includes information such as the location, attributes, and time of data collection, aiding in the effective organization and interpretation of the data.

Aggregating and Analyzing Data

Data mining plays a crucial role in making sense of vast amounts of data collected from various surveillance and transactional sources. Through sophisticated algorithms, it turns the raw data into actionable insights, enabling organizations to leverage big data for decision-making purposes.

Standardization in Databases

To accommodate data inconsistencies and enhance retrieval and analysis, standardization through classification and coding is applied. This helps in unifying differing representations of similar data within the database, facilitating accurate analysis and querying.

When evaluating a dataset's adequacy, it's important to consider the relevance and quality of the data in relation to the research questions or conceptual framework. The process should be part of a well-planned research design to avoid irrelevant or useless data, highlighting the limitations of blind data mining.

To change the overall design of an entire document to include colors, fonts, and effects, a user should apply a _____.

Answers

To change the overall design of an entire document to include colors, fonts, and effects, a user should apply a theme.

What are the characteristics of a theme?

The characteristics of the theme are as follows:

A theme may be defined as a combination of desktop background pictures, window colors, and sounds. It is used to determine the visual appearance of all windows, applications, dialogs, panels, and applets. It completely demonstrates the visual interface to the items that appear on the window.

The theme can be utilized in order to change the complete design of an entire document to include colors, fonts, and effects. Sometimes, themes are modified according to the need and interests of the user. They possess specific properties in the computer and technology.

Therefore, a user should apply a theme when he/she wants to change the overall design of an entire document to include colors, fonts, and effects.

To learn more about Theme, refer to the link:

https://brainly.com/question/26624021

#SPJ6

Which of the following statements is considered a safe rule of communication A Anyone you know only online is a stranger to you B After you get to know someone online, they can be considered a trusted friend C If you want to know if you can trust someone you met online, ask him to meet in person D Most people online are safe, so you don’t really need to worry about safe communication

Answers

A. Anyone you know only online is a stranger to you.

Answer:

A

Explanation:

took quick check conexus

Presentation aids should include short phrases or images to convey your message. True False

Answers

True

Other than words of speech, presentation aids are items used to support what the speaker is relaying. They can be visual or audio aids or other technologies that are supported. Highlighting new points with appropriate and short phrases, rather than complete sentences is important to a good presentation aid.
Images or photographs on the other hand provide a picture of reality and are used to illustrate a point, action, or evoking an emotion. It shows an important but an unfamiliar detail.  




Coordinates that measure how far a point is from the origin are _______________. A. Relative coordinates B. Absolute coordinates C. Negative coordinates D. X coordinates

Answers

the correct answer is B

Answer:

answer b

Explanation:

A group of scientists are working on research. All of them need to simultaneously work on the computer and perform different operations. Which operating system do they need to use?

Answers

probably windows 10 because you can have more than one desktop on the same computer.i hope this helps!
Other Questions
What is the function whose graph is the same as that of f(x) = -3x + 1 but shifted to the right 2 units and up 3 units? What is the general form of the equation for the given circle? How can media coverage of polling influence the outcome of an election? Check all that apply. Voters are less informed about the potential outcome of the election. Candidates learn more about their standing. Voters may be more or less motivated to support a candidate. Candidates are less informed about voter desires. Campaigns are more able to predict election outcomes. Lipids with high polyunsaturated fatty acid content are what at room temperature Given the geometric sequence where a1 = 2 and r = 2 find a9323222562562 Glomerulitis can cause an accumulation of protein in the urine called _______. Describe the energy transformations that occur from the time a skydiver jumps out of a plane until landing on the ground. Three pizzas of the same size were purchased for a party. After the guests finished eating pizza, 1/3 of the first, 1/4 of the second, 1/6 and of the third pizzas were leftover. Part A If the leftover pieces are combined, what fraction of one whole pizza remains? Explain how you got your answer. Part B What fraction of all three of the pizzas purchased for the party was eaten? Explain how you got your answer. Part C Only six guests ate pizza at the party. If all of them ate the same amount, what fraction of one pizza did each person eat? Explain how you got your answer. Read the sentence. Janet was late to work because her car wouldnt start. Which organizational structure is used? A. compare and contrast B. cause and effect C. chronological order D. problem and solution thinks to the the efforts of the number of inventors, the industrial revolution began an England textile industry who invented the water frame that can spin around the clock Which sentence shows INCORRECT use of subject-verb agreement? A)The committee arrives at the meeting one at a time. B)The audience claps its approval at the political rally. C)The entire Congress voted unanimously to repeal the law. D)The team members yells at one another to keep their momentum going during half-time. You want to learn about your congressperson's voting record. Where would you find information on how they voted? A: PetitionB: House recordsC: Congressional recordD: Speaker's notes The movement of food substances from the stems to growing tissues and storage tissues is called: The table below shows the set of traits in four different beetle populations.Traits in PopulationPopulationTraits1Brown-colored beetles, pesticide-resistant gene present2Green-colored beetles, pesticide-resistant gene absent3Green and browncolored beetles, pesticide-resistant gene absent4Green and browncolored beetles, pesticide-resistant gene presentWhich population of beetles is most likely to become extinct when the existing conditions change? how do I get from step 3 to step four? please explain. sin x = opposite over hypotenuse sin 45 = 50 over x 0.707106781 50 over x(0.707106781)x 50 x 70.71 Find the ADVERB(S) in the sentence. Note: the sentence may not contain adverbs. Mom put beans in the jar. none in the sentence put beans in the jar fill in the blanks on the pattern 98,97,95,92,88 ? ? Simplify[tex]4(2 + 3i) -2 (6 - 8i)[/tex] A book rests on a table, exerting a downward force on the table. the reaction to this force is: A 5-pound of flour costs $4.80. For this bag of flour, what is the cost of flour per ounce? (1 pound = 16 ounces)a. $0.06b. $0.16c. $0.60d. $0.96