Ip addresses and their corresponding domain names are used to identify computers available through the internet.

Answers

Answer 1
domain names would be the answer

Related Questions

To communicate with the operating system running on the computer, each device also requires a software element known as what?

Answers

To communicate with the operating system running on the computer, each device also requires a software element known as what? Answer: The device driver 

Which of the following is a great collection of resources for those entering the workforce or embarking on a new career? A. TED Talks B. Ontario Public TV C. LearnThat D. 21st Century Framework

Answers

Its definitely C. Learn That

Answer:

The correct option of the following question is C.) LearnThat

Explanation:

LearnThat is the American Foundation which is the American 5013 non-profitable organization that manages and develops the online spelling and vocabulary program along with the free multimedia dictionary for learners, an Open Dictionary of the English. Foundation was established in the February 2004 under name eSpindle Learning.

The __________ determines whether coolant should be pumped back into the engine directly or cooled first.

Answers

The THERMOSTAT determine whether coolant should be pumped back into the engine directly or cooled first. The flow of coolant in vehicles is controlled by the thermostat which allow the engine to increase in temperature up to the acceptable level, the thermostat then has to decide whether to send the coolant back into the engine or to have it cooled first.  

A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. science forums

Answers

With the use of a database application people can store and retrieve large quantities of data almost instantaneously. Database applications can also be used to present the information in easy to read and understand forms. Database applications serve as an intermediary between the raw data and a user, making it easier to sort and use the data.

A software component that has ____ mode access has total access to all of the computerâs data and its hardware.

Answers

The kernel has access to all data and hardware.

The part of the poppet valve that contacts the valve seat is called the A. face. B. margin. C. head. D. stem.

Answers

It should be A face, I think

Answer:

A. Face

Explanation:

A poppet valve some time called mash room valve.The word poppet shares etymology with "puppet". In past "puppet valve" was synonym for poppet valve. however, this usage of "puppet" is now obsolete. The valve stem moves up and down inside the passage called guide, which is fitted in the engine-block. the head of the valve called valve face, is generally ground to a 45 degree angle. So as to fit properly on the valve seat in the block and prevent leakage.

Image files are grouped into two categories: _____.

Answers

Final answer:

Image files can be broadly classified into two categories: raster graphics and vector graphics. Raster graphics are pixel-based and include formats like JPEG, GIF, and BMP, whereas vector graphics use mathematical formulas to represent images, allowing them to be scaled without losing quality, with SVG being a common format.

Explanation:

Image files are grouped into two categories: raster graphics and vector graphics. Raster graphics, such as JPEG, GIF, and BMP, store images as a collection of pixels, with each pixel representing a single color. The quality of these images is dependent on their resolution, with higher pixel densities resulting in sharper images. Examples of raster graphics include digital photos which are often seen in JPEG format. On the other hand, vector graphics, such as SVG, define images using mathematical formulas that represent shapes and lines. This allows vector images to be scaled up or down in size without losing quality, making them ideal for logos and other designs that need to be resized frequently. Common examples of vector file formats include SVG (Scalable Vector Graphics).

Understanding the differences between these two categories is essential for working efficiently with digital images, each having their unique advantages depending on the application.

A popular use of cd-rw and cd-r discs is to create audio cds. what is the process of copying audio and/or video data from a purchased disc and saving it on digital media called?

Answers

This process is called ripping. Ripping occurs when the audio or video content of a disc is extracted and copied onto any other digital media. This process does not damage the original disc or the data it contains. This process requires specific software to be successful.

Your school computer library has a network that connects computers and devices within a few small rooms. what type of network does it likely use?

Answers

a routed and secured network which can send internet access to all computers 

You want to enable nap so that all portal computers using wireless connections have an active firewall. which type of enforcement policy should you implement?

Answers

If you want  to enable NAP so that all portal computers using wireless connections have an active firewall, then the type of enforcement policy that should be implemented would be the 802.1x enforcement. It can be used to be able to restrict network access when a certain computer is regarded as a noncompliant to requirements.

Combination charts enable you to show three sets of data using the chart type that is best for each data set. _________________________. qizlet
a. True
b. False

Answers

The answer is true enjoy your night

In microsoft windows when a window is minimized what happens to that window

Answers

it stays on what you are doing until you unminimize it to continue your work

________ involves taking data from your database and putting it into an electronic file in a format that another external application or database can recognize.

Answers

The answer in the space provided is export. It is because in export, is has the ability to take the data in another file or application which is externally but could still be recognizable. It is a way of sending a file externally or placing them outside of the file that it came from. It could be seen above as it is similar of how it is being remove and placing it in another external application.

In which osi model layer(s) do nics operate?

Answers

NIC's operate on the Physical = Layer 1

Common types of possessed objects are smart cards, rfid-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.

Answers

Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, USB security tokens, and smartphones that are swiped through or placed close to a reader to be read. The USB security token is a physical security device used to gain access to an resource, that is electronically restricted.  The token provides secure storage for multiple login credentials.

Class 00 rubber gloves are used when working with voltages less than​ _____.

Answers

Answer: 500 volts AC, 750 volts DC
Class 00 rubber gloves are given the color "beige" based on the color code of rubber gloves.
The proof test voltage for this class of rubber gloves is 2500 volts of AC voltage and 10000 volts of DC voltage

If a magnetic disc has 100 cylinders, each containing 10 tracks of 10 sectors and each sector can contain 128 bytes, what is the maximum capacity of the disk in bytes

Answers

Answer:

The maximum capacity of disc is 12,80,000 bytes.

Step-by-step explaination:

Given a magnetic disc having 100 cylinders & each containing 10 tracks of 10 sectors. Hence, total no. of sectors in magnetic disc are [tex]100\times 10\times 10[/tex]=10000 sectors

Each sector contain 128 bytes.

we have to find the maximum capacity which can be calculated as

Maximum capacity = No. of sectors[tex]\times[/tex]capacity of sectors

                               =  10000[tex]\times[/tex]128

                              = 12,80,000 bytes

The maximum capacity of the disk is 1280000 bytes.

Further Explanation:

It is given that a magnetic disc having 100 cylinders and each cylinder containing 10 tracks of 10 sectors.

Therefore, the number of sectors in the magnetic disc is the product of total cylinders, tracks and sectors.

The number of sectors is calculated as,

[tex]\begin{aligned}\text{Total sectors}&=100\times 10\times 10\\&=10000\end{aligned}[/tex]

The maximum capacity of the magnetic disc is the product of number of sectors in magnetic disc and capacity of a sector.

[tex]\begin{aligned}\text{maximum capacity}&=10000\times 128\\&=1280000\end{aligned}[/tex]

Thus, the maximum capacity of the magnetic disc with 10000 sectors and capacity of 128 bytes is 1280000 bytes.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623

Answer details:

Grade: College Engineering

Subject: Computer Science and Technology

Chapter: Computer hardware

Keyword:

Capacity, maximum, hardware, magnetic, disc, sector, bus, bytes, bits, product, cylinder, track, compact disc, hard drive, floppy, optical disc, architecture, computer,  floppy disk, magnetic tape, MB, KB, disk

Choose the correct html element to define important text

Answers

The HTML element to describe significant text is the <strong>. An HTML element is an distinct constituent of an HTML document or web page when this has been analyzed into the document object typical. HTML is composed of a tree of HTML nodes such as text nodes. Each node can have HTML attributes specified. Nodes can also have content including other nodes and text. Many HTML nodes represent semantics or meaning. For example, the title node indicates the name of the file and an HTML element is distinct by an primary tag. If the element comprises other gratified it ends with a terminating tag where the element term is headed by a onward slash.

The HTML element to describe significant text is the <strong>.

How it this so?

When investigated into the document object, an HTML element is a discrete part of an HTML document or web page. HTML is made up of a tree of HTML nodes like text nodes.

HTML properties can be supplied for each node. Nodes can also include content such as other nodes and text. Many HTML nodes are used to represent semantics or meaning.

For example, the title node specifies the file's name, while an HTML element is distinguished by a main tag. If the element contains additional gratified, it ends with a terminating tag that is preceded by a forward slash.

Learn more about HTML element at:

https://brainly.com/question/11569274

#SPJ6

What is the best method for collecting information from a source?

A. Provide citation info

B. Summarize or paraphrase important info

Answers

The best method for collecting information involves summarizing, paraphrasing, or directly quoting the source material, always with proper citations to avoid plagiarism and maintain credibility.

The best method for collecting information from a source is multifaceted and depends on your research objective. When considering the notes from your sources, you have the choice to summarize, paraphrase, or directly quote the information. Summarizing involves conveying the general idea of a text in a shorter form, without detailed specifics. Paraphrasing is close in length to the original text but rephrased in your own words. Direct quoting maintains the exact wording from the source and is placed inside quotation marks. Regardless of the choice made, proper in-text citation is crucial in order to credit the original author and avoid plagiarism. This practice preserves the integrity of your work and provides a pathway for readers to verify your sources.

When collecting information, it's essential to keep meticulous notes, ensuring that you clearly distinguish between your ideas and those borrowed from sources. Effective note-taking allows you to refer back to the original texts which aids in accurate quoting and paraphrasing. Moreover, the organization of source material and notes will assist in accurately citing your information sources, thus upholding your professional credibility.

Suppose you wanted to run a web server or ftp server from your home. what type of ip address would you want?​

Answers

you would need to have a static ip address.

When you save data on a disk, the os places it in an available storage area, or?

Answers

When you save data on a disk, the OS places it in an available storage area, or a "Sector".
Usually the computer places that data in sectors in an order and usually next to each other but that is not the case always, sometimes part/s of that data can be scattered at different places which actually slows down the computer, for which we need to Defragment the disk space.   

You want to use a terminal emulation program to terminal into a series of Cisco routers. You will be managing these devices remotely. What protocol should you use?

Answers

If a terminal emulation program is used and the devices should be reotely managed, then you should use the Telnet protocol. Telnet is a simple, text-based network protocol that is used for accessing remote computers over TCP/IP networks like the Internet. It allows the user access to a text terminal and all its applications such as command-line for example. 

When using color in computer-generated presentation aids, you should use?

Answers

When using color in computer-generated presentation, you should use the same background color on all visuals and no more than two colors for words. This is a principles of color and must be applied in computer-generated presentation aids like models,graphics( visual representations of information) and pictures (photographs and illustrations).

Emilio has created a document in Word and needs to print labels. He is shopping at a store and finds Avery labels and another brand that is less expensive. What does Emilio need to do before buying the less expensive labels?

Answers

He needs to make sure that the less expensive label is compatible with Word. 
Final answer:

Emilio should check the less expensive labels for Word compatibility, ensure they fit his printing and application needs, and confirm that he can create or find a suitable template before purchasing.

Explanation:

Before Emilio purchases the less expensive labels, he needs to ensure that they are compatible with the Word document he created for printing labels. First, he should check the packaging of the labels to see if they provide a template or mention compatibility with Word. Many label manufacturers offer templates that can be downloaded and used within Word. If no information is provided, Emilio should look for the label size and compare it to the available templates in Word, or consider measuring the label dimensions and configuring a custom template if necessary.

Furthermore, Emilio should make sure that his printer can handle the label material and that the label adhesive is suitable for the surface to which they will be applied. If the less expensive labels provide all the necessary details for creating a Word template and are suitable for his printing and application needs, he can opt for the more affordable option without compromising his project.

Which of the following options is used to view a computer's memory properties?

a) Accessories
b) Device Manger
c) Sytem and Hardward
d) Control Panel

Answers

It really depends on the computer's operating system but I'm pretty sure its either C or D
Cant choose well its c or d

Which two software interfaces allow adjustment of the cpu voltage? (choose two.)?

Answers

Below are the software interfaces allow adjustment of the CPU voltage:


UEFI Settings;
BIOS Settings

Unified Extensible Firmware Interface (UEFI) is a detail for a product program that associates a PC's firmware to its working framework (OS). UEFI is required to in the long run supplant BIOS. Like BIOS, UEFI is introduced at the season of assembling and is the principal program that runs when a PC is turned on. 
BIOS (basic input/output system) is the program a PC's microchip uses to kick the PC framework off after you turn it on. It likewise oversees information stream between the PC's working framework and joined gadgets, for example, the hard circle, video connector, console, mouse and printer.

A battery becomes undercharged in a vehicle that is driven regularly. the charge indicator light remains off with the engine running. the cause of this problem could be

Answers

If the  battery is not charging it indicates that the generator is not working properly. It may be simply that the V-belt which goes from the crankshaft to the generator is too loose, or the generator may be faulty and may need to be replaced.

Which is NOT a type of SD card?
SD standard capacity
SD medium capacity
SD high capacity
SD input/output

Answers

I'm pretty sure the answer is B.

SD SC can held up to 2GB capacity

SDHC can held up to 32 GB

SDXC (eXtended) can held up to 2TB

SDIO is an interface for I/O devices, there are cameras with this standard.

Answer:

Your correct answer is B SD medium capacity

Explanation:

The _________ design feature enables vehicles to enter or leave the main highway, while flowing with the traffic.

Answers

The FORK design feature enables vehicles to enter or leave the main highway, while flowing with the traffic.

What programming language transformed the software industry because beginning students could learn it easily?

Answers

C programming transformed the software industry.
Other Questions
This needs to contain only positive exponents what is the ratio of x to y (simplest form) x= 2 y=6 x=5 y=15 x=8 y=24 Interest groups tend to focus on single issues and most often give donations to incumbents. democrats. republicans. new candidates. In how the other half lives, jacob riis wrote: "with half a chance it might have lived; but it had none. that dark bedroom killed it." what does this mean?apex The process by which stem cells become specialized cells is called? A.)Elongation B.)Differentiation C.)Growth D.)Speciation Find the area. SquareA = s^2s - side. 1.) In a traffic jam when drivers can't get where they are going on time or at the expected speed of travel this is referred to as _____.a.) Restrictionb.) Distractionc.) Regulationd.) Obstruction How is the following passage from a cause-and-effect essay organized? Even if the bill is late, the date in the upper-right corner must be entered in the database. If the date of entry is accidentally entered instead of the bill date, the accounting department will not be able to write a check for the bill. According to Ms. Garcia, the department manager, the date is essential for tracking and paying bills. subject by subject by chronological order point by point by order of importance Read the sentence. we went to santa fe, which is the second-oldest city in the united states. which word is the action verb? A carbon atom is most likely to form what kind of bond(s) with other atoms? ionic bonds, covalent bonds, and hydrogen bonds covalent ionic hydrogen covalent bonds and hydrogen bonds The following table shows the expressions that represent the sales of 4 companies: CompanyABCD Sales170(1.04)x330(1.80)x250(0.06)x120(1.09)x Rank the company sales by smallest to largest percent of increase and select the correct answer below. In the figure below, segment AC is congruent to segment AB:Triangle ABC with a segment joining vertex A to point D on side BC. Side AB is congruent to side ACWhich statement is used to prove that angle ABD is congruent to angle ACD? Which of the following themes is an example of juxtaposition?a. innocence and experienceb. expectations and realityc. community and self (incorrect)d. Both B and C ( Incorrect)e. All of the above Classical greek culture is best characterized by What type of rock comprises most of the exposed surface of earth (75%)? Ten percent of your grade for this assignment is based on your explanation of two basic principles of communication: What can you say about the nature of any other zeros of the quadratic equation which has one complex zero? Explain your answer. DATA MANAGEMENT GRADE 12! HELPBetween periods at a hockey game, some fans are selected to shoot a puck at the net from each of 10 m, 15 m and 30 m, with winnings of $50, $100 and $1000 per goal scored, respectively. The chance of scoring from each position has been estimated to be 60%, 20% and 2%, respectively. What is the expected payout per fan? Question 6 options: $140 $70 $2300 $26 620 Complete the pattern ___, ___, ___, 0, 2, 4, 6 What is the ph of a 0.0075 m concentration of hydrochloric acid hcl? 0.50 1.1 2.1 3.2? Steam Workshop Downloader