A(n) ____ is a set of independent computer systems connected by telecommunication links for the purpose of sharing information and resources.

Answers

Answer 1

A computer network is a set of independent computer systems connected by telecommunication links for the purpose of sharing information and resources.

What are computer networks?

Computer networking is known to be a kind of an  interconnected layer of computing devices that is known to help in the function of exchange of  data as well as share resources with one another.

Note that these said networked devices are said to be a kind of  a system of rules known to be called the communications protocols.

They are said to help in regards  to transmission of information over physical and wireless technologies.

Therefore, A computer network is a set of independent computer systems connected by telecommunication links for the purpose of sharing information and resources.

Learn more about computer network from

https://brainly.com/question/1167985

#SPJ1


Related Questions

The nurse is reviewing a client's history, which reveals that the client is participating in a psychiatric rehabilitation program. the nurse understands that which is the goal of this program?

Answers

The client is enrolled in a mental rehabilitation programme, the nurse discovers while analyzing the client's history. The nurse is aware that clients should be empowered to participate in this programme at their best level of functioning.

What is a psychiatric rehabilitation program?

A psychiatric rehabilitation programme, or PRP for short, aims to provide people with mental illnesses with a range of services, treatments, and supports. These programmes seek to improve patients' quality of life, recovery, and results while successfully integrating them with social and community services.

People with serious and persistent mental diseases must develop the emotional, social, and intellectual skills essential to live, learn, and work in society with the least amount of professional support possible (1).

A crucial component of a mental health care is psychiatric rehabilitation. For individuals who have been diagnosed with any mental health disease that seriously hinders their capacity to lead meaningful lives, it encourages recovery, community integration, and enhances quality of life.

To learn more about psychiatric rehabilitation program, refer to:

https://brainly.com/question/25818042

#SPJ4

For a network technician, one benefit of understanding the osi seven-layer model and how traffic in an actual network works through the model is applying this knowledge to __________.

Answers

For a network technician, one benefit of understanding the OSI seven-layer model and how traffic in an actual network works through the model is applying this knowledge to: troubleshoot networks.

What is the OSI model?

OSI model is an abbreviation for open systems interconnection and it comprises seven (7) main layers, which typically starts from the hardware layers (layers in hardware systems) to the software layers (layers in software systems)

The layers of the OSI model.

Basically, there are seven (7) layers in the open systems interconnection (OSI) model and these include the following in sequential order;

Physical LayerData link LayerNetwork LayerTransport LayerSession LayerPresentation LayerApplication Layer

In Computer networking, understanding the OSI seven-layer model and how traffic in an active network works through the OSI model can be used to troubleshoot networks.

Read more on OSI model here: brainly.com/question/26177113

#SPJ1

____ is concerned with the security of computers or devices that are part of a network infrastructure.

Answers

Network security is concerned with the security of computers or devices that are part of a network infrastructure.

Network security can be defined as a broad term that includes many technologies, devices and processes. In the simplest terms, network security is a set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using software and hardware technologies. Every organization, regardless of size, industry, infrastructure or structure needs a level of network security solution to protect it from the ever-evolving cyber threat landscape in today's wild.

There are many avenues to consider when addressing network security across an organization. Attacks can occur at any path in the network security layer model, so hardware, software, and network security policies must be designed to address each area. Network security usually consists of three distinct controls: physical, technical and administrative.

You can learn more about network security here https://brainly.com/question/14407522

#SPJ4

Question 1 (3.33 points)
The Bureau of Labor Statistics states that the median pay for a network
administrator is
$699,670
$19,000
$69,160
$49,780

Answers

Answer: the answer is 19,00

The Bureau of Labor Statistics states that the median pay for a network administrator is $69,160

What is the meaning of Network Administrator?

Network administrators is known to be a person that is said to work by making sure the computer networks of any kind of organization are said to be secure and working properly.

Note that A network administrator is an IT professional  that is said to be very sensitive and need skills and as such, the Bureau of Labor Statistics states that the median pay for a network administrator is $69,160.

learn more about network administrator from

https://brainly.com/question/20424057
#SPJ1

The sysadmin,audit,network, security (sans) institute offers training and it security certifications through?

Answers

Through Global Information Assurance Certification (GIAC), the Sysadmin, Audit, Network, Security (SANS) Institute provides training and it security certifications.

Global Information Assurance Certification (GIAC) is a company that issues information security certifications and specializes in innovative research as well as theoretical and practical certification through its GIAC Gold program. The certification body was established in 1999 by SANS Institute, and The Escal Institute of Advanced Technologies owns the trademark on the name "GIAC."

A group of vendor-neutral computer security certifications from GIAC are tied to the SANS training programs. In order to stay abreast of "black hat" methods, GIAC focuses specifically on cutting-edge technological advancements in IT security.

Learn more about Global Information Assurance Certification (GIAC) https://brainly.com/question/14953137

#SPJ4

Consider this sequence of bits: 1000111001011011 0011100010001110 1010101100101111 0110010000010110 1011100011000111 what is true about this binary data?

Answers

The true statement about this binary data is that: C. This sequence of bits might represent positive, negative, or fractional numbers.

What is binary encoding?

Binary encoding can be defined as a standard technique that is designed and developed to convert data in plain text (source alphabets) to a form that is easily used by different operating systems (OS), especially through the use of a binary digit (bit) or two-symbol system.

What is a numerical data?

A numerical data is also referred to as a quantitative data and it can be defined as a data set that is primarily expressed in numbers only, which can either be positive, negative, or fractional numbers. This ultimately implies that, a numerical data refers to a data set consisting of numbers rather than words.

In this context, we can reasonably infer and logically deduce that the true statement about this binary data is that this sequence of binary digits might represent positive, negative, or fractional numbers.

Read more on binary digits here: https://brainly.com/question/16612919

#SPJ1

Complete Question:

Consider this sequence of bits:

1000111001011011

0011100010001110

1010101100101111

0110010000010110

1011100011000111

What is true about this binary data?

A. This sequence of bits might represent positive numbers and fractional numbers, but it could not represent any negative numbers.

B. This sequence of bits might represent positive and negative numbers, but it could not represent any fractional numbers.

C. This sequence of bits might represent positive, negative, or fractional numbers.

D. This sequence of bits might represent positive numbers, but it could not represent any negative or fractional numbers.

Write a statement that reads a word from standard input into firstword. assume that firstword. has already been declared as an char array large enough to hold a 50-letter word.

Answers

A statement that reads a word from standard input into firstword and is large enough to hold a 50-letter word is cin >> firstWord;

What is a Computer Statement?

This refers to the syntactic unit of a programming unit that carries out a function.

Hence, we can see that A statement that reads a word from standard input into firstword and is large enough to hold a 50-letter word is cin >> firstWord;

This statement ensures that when a word is reads from standard input into first word, it is large enough to hold a 50-letter word is given above.

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

When iteration is indicated for an element or a group of elements in the data dictionary:_______.

Answers

When iteration is indicated for an element or a group of elements in the data dictionary DO WHILE, DO UNTIL, or PERFORM UNTIL structured English statements must be included

There are three primary types of control structures in structured English: DO WHILE, DO UNTIL, and PERFORM UNTIL. Each has a specific purpose and use cases.

DO WHILE is used when you want to iterate an element or group of elements until a certain condition is met. For example, you may want to DO WHILE a certain number is less than 10.

DO UNTIL is used when you want to iterate an element or group of elements until a certain condition is no longer true. For example, you may want to DO UNTIL a certain number is greater than 10.

PERFORM UNTIL is used when you want to repeat an action until a certain condition is met. For example, you may want to PERFORM UNTIL a certain number is equal to 10.

Each of these control structures has its own advantages and disadvantages. It's important to choose the right one for the task at hand. In general, DO WHILE and DO UNTIL are best for looping through data, while PERFORM UNTIL is best for repeating an action.

Learn more on data dictionary here:

https://brainly.com/question/8897251

#SPJ4

The​ ______ class limit is the smallest value within the class and the​ ______ class limit is the largest value within the class.

Answers

The​ lower class limit is the smallest value within the class and the​ upper class limit is the largest value within the class.

Class limits in a frequency distribution denote the least and greatest possible data values for each class. There is a lower class limit and an upper class limit for each class in a frequency distribution. Lower class limit: The smallest data value that can be a member of a class.

In order to acquire class limits in inclusive form, subtract 0.5 from the lower limit and add 0.5 to the upper limit. As a result, the inclusive form of the class limits for the 10–20 class interval is 9.5–20.5. Class size is the distinction between a class interval's true upper limit and true lower limit.

Learn more about class limit:

https://brainly.com/question/24701109

#SPJ4

Which two contextual tabs help you change the look and feel of SmartArt?

Answers

PowerPoint offers two contextual tabs that enable you to modify the design and format of your SmartArt graphics: the SmartArt Tools – Design tab and the SmartArt Tools – Format tab. Note that these contextual tabs appear only when you have selected a graphic. If they disappear, select your graphic again to view them.

A _____ row is added to the query design grid when the totals button is clicked.

Answers

A total row is added to the query design grid when the totals button is clicked.

What is query design in MS Access?

A query is known to be one that can be either a form of a request for data results obtained from a given  database or for work or function on the data, or for both.

Note that a query can be a tool that helps to give you a result to a simple question, carry out  calculations, join  data from a lot of tables, add, alter , or delete data from a database.

Therefore, A total row is added to the query design grid when the totals button is clicked.

Learn more about query design from

https://brainly.com/question/27755787

#SPJ1

Smartphones use ________ technology, allowing users to perform several functions with one device.

Answers

Smartphones use convergence technology, allowing users to perform several functions with one device. Therefore, the correct answer is A) convergence.

What are smartphones?

Smartphones can be defined as hybrid versions of mobile devices that are designed and developed to have more features, so as to enable them run different software applications, functions and perform tasks with the aid of software applications such as web browsers, multimedia player, etc.

Types of smartphones.

In Computer technology, there are three popular types of mobile devices and these include the following:

Handheld computersPersonal digital assistants (PDAs)Smartphones.

In Computer technology, smartphones are designed and developed to use convergence technology by combining previously unrelated technologies together, in order to allow end users perform several functions with one device.

Read more on smart phones here: brainly.com/question/15867542

#SPJ1

Complete Question:

Smartphones use ________ technology, allowing users to perform several functions with one device.

A) convergence

B) grid computing

C) embedded design

D) invisible computing

If you are given a list of numbers (b11:c20), and you want the 6th smallest number in that list, which formula is correct?

Answers

If you are given a list of numbers (b11:c20), and you want the 6th smallest number in that list, the correct formula is =LARGE(B11:C20, 6).

What is Excel Formula?

In regards to Microsoft Excel, a formula is seen as a kind of an expression that tends to function on values that can be found within a range of cells.

Note that these formulas are said to often return a result, even if  it is an error. Excel formulas helps a person to carry out calculations such as addition, subtraction, and others.

Thus, If you are given a list of numbers (b11:c20), and you want the 6th smallest number in that list, the correct formula is =LARGE(B11:C20, 6).

Learn more about Excel formula from

https://brainly.com/question/27927845

#SPJ1

Suppose a new CPU reduces the voltage by 20% and reduces the frequency by 40%, while having the same capacitive load as the old CPU, how much power savings would be achieved compared with the old CPU?

Answers

Quad-core processors range from 95 to 140 watts, whereas standard CPUs need 65 to 85 watts.

What function does a central processing unit (CPU) serve?The CPU is the computer's "brain," housing all the electronics needed to process input, store data, and output results.Software Programmes that describe which data to process and in what order make constant demands on the CPU.The CPU processes every command that a computer's hardware and software send to it.For instance, the CPU processed the instructions needed for your computer's web browser to open and display this web page.The CPU is frequently described as the brain of the computer. The processing of data is what the CPU does.The CPU handles calculations, sorting, and searching tasks.Quad-core processors range from 95 to 140 watts, whereas standard CPUs need 65 to 85 watts.

To learn more about CPU, refer to:

https://brainly.com/question/26991245

#SPJ4

A(n) ____________________ is the location of a data element in a storage device.

Answers

Answer:

Address

Explanation:

A(n) Address is the location of a data element in a storage device.

Which assignments would yield a non-floating-point number for y? y = 32.0 (x / (z 1.0));

Answers

An assignment which would yield a non-floating-point number for y in y = 32.0 + (x / (z + 1.0)); is: d. x = 1.0; z = -1.0;

The kinds of data type.

In Computer programming, there are five recognized data types and these include the following:

Integer type (int).Character type (char).Floating point type (float).Boolean (bool)String (str)

What is a non-floating-point number?

A non-floating-point number can be defined as a type of number which does not contain floating decimal points, which may also either be positive or negative whole number.

y = 32.0 + (x / (z + 1.0));

y = 32.0 + (1.0 / (-1.0 + 1.0));

y = 32.0 + 1.0

y = 33.0.

Read more on floating-point number here: https://brainly.com/question/25694406

#SPJ1

Complete Question:

Which assignments would yield a non-floating-point number for y? y = 32.0 + (x / (z + 1.0));

a.x = 0.0; z = 1.0;

b.x = -32.0; z = 1.0;

c.x = 0.0; z = 0.0;

d. x = 1.0; z = -1.0;

With the database approach, data descriptions are stored in a central location known as a:_____.

Answers

With the database approach, data descriptions are stored in a central location known as a repository.

What is repository in computer?

In regards to the use of  information technology, a repository is known to be a term that connote the central region where all work regarding the aggregation of data is known to be kept.

It is known to be the point at which data are said to be maintained in an way that is known to be organized in computer storage.

Therefore, With the database approach, data descriptions are stored in a central location known as a repository.

Learn more about repository from

https://brainly.com/question/20351998

#SPJ1

Why would a company want to utilize a wildcard certificate for their servers? to increase the certificate's encryption key length to reduce the certificate management burden to secure the certificate's private key to extend the renewal date of the certificate see all questions back next question

Answers

a company would want to utilize a wildcard certificate for their servers to reduce the certificate management burden.

In this case, you're not dealing with multiple installations, various renewal dates, and ongoing certificate additions as your business expands. You only have control over one certificate. Simple!

Similar to how Wildcards are more affordable than securing each sub-domain separately, they are also significantly simpler from a technical and administrative perspective to safeguard your online footprint.

Follow the link below to see other measures for securing a server

https://brainly.com/question/27807243

#SPJ4

Jamie has just developed a small game. She shows it to her friends, but they are confused about what the point of the game is. What aspect of her game does Jamie need to work on?
A.
the rules of the game
B.
the objective of the game
C.
the outcome of the game
D.
the components of the game

Answers

Answer:

pls I think is the A. the rules of the game

The mark i was considered a highly sophisticated calculator instead of a computer because?

Answers

It is because the Mark I could not make decisions about the data it processed.

A general-purpose electromechanical computer called the Harvard Mark I, also known as the IBM Automatic Sequence Controlled Calculator (ASCC), was utilized in the last stages of World War II.

John von Neumann started one of the first programs that ran on the Mark I on March 29, 1944. Von Neumann had to decide whether implosion was a practical method for igniting the atomic bomb that would be deployed a year later while working on the Manhattan Project at the time.

The Mark I could also compute and print mathematical tables, which was what British inventor Charles Babbage had intended when he created his "analytical engine" in 1837.

Learn more about the history of computers https://brainly.com/question/14667239?

#SPJ4

How do you change the desktop background in the macos mojave operating system?

Answers

Answer: Click the System Preferences icon on the dock. In the first row, click Desktop & Screen Saver.

Explanation: When it comes to macOS versions, Mojave and High Sierra are very comparable. The two have a lot in common, unlike Mojave and the more recent Catalina.

What logs should you check to possibly find out why active directory replication is failing?

Answers

One that should be checked to find out why Active Directory replication is failing is the Directory Service Logs.

An easy explanation is like comparing a car to its engine. The active directory is the central database on the domain controller, where the login credentials of all computers, clients, printers, and other resources are stored. When a user tries to log in, their login credentials must be the same as those stored in AD.

Active Directory logs events to Directory Services or the LDS Instance log in Event Viewer. The user can use the information collected in the logs to help the user diagnose and resolve possible problems or monitor the activity of Active Directory related activities on the user's server.

You can learn more about active directory here https://brainly.com/question/14469917

#SPJ4

A wireless channel is ____________.
a) an example of an ad-hoc network.
b) a portion of a frequency band.
c) a point-to-point wireless connection.
d) a collision domain.

Answers

A wireless channel is: b) a portion of a frequency band.

What is wi-fi?

Wi-Fi can be defined as a wireless network technology that is designed and developed to avail end users and network devices such as computer systems, mobile devices, router and switches, to communicate with one another over the Internet or through an active network connection.

In Computer technology and networking, the global system for mobile communication (GSM) and the wireless channel is typically designed and developed to operates at the following bands of frequencies (frequency band):

850 MHz900 MHz1800 MHz1900 MHz2.4 GHz3.6 GHz4.9 GHz5 GHz5.9 GHz6 GHz 60 GHz

Read more on frequency bands here: brainly.com/question/19097094

#SPJ1

Which two configuration steps are required before quick actions can be used in macros?

Answers

The two configuration steps are required before quick actions can be used in macros are:

B . Quick Actions must be enabled in the org.

C . The specific quick action must be added to the case Feed.

What is Computer configuration?

In regards to communications or the use of computer systems, a configuration of a system is known to be a term that connote a kind of an arrangement  or setting of all of its functional units.

It is one that is known to be based to their nature, number as well as main chief characteristics.

Therefore, The two configuration steps are required before quick actions can be used in macros are:

B . Quick Actions must be enabled in the org.

C . The specific quick action must be added to the case Feed.

Learn more about configuration from

https://brainly.com/question/13484609
#SPJ1

October 6, 2021examsLeave a commentPost navigation

Which two configuration steps are required before quick actions can be used in Macros?

A . Global Actions needs on the publisher layout.

B . Quick Actions must be enabled in the org.

C . The specific quick action must be added to the case Feed.

D . The specific quick action must be added to the case record Type.

Which internet explorer security feature restricts the browsing session information that can be tracked by external third-party websites and applications?

Answers

Tracking protection internet explorer security feature restricts the browsing session information that can be tracked by external third-party websites and applications

The internet can be a dangerous place, and it's important to take steps to protect your privacy. One way to do this is to enable tracking protection in your web browser.

Tracking protection is a security feature that restricts the information that can be tracked by external websites and applications. This means that your browsing session will be more private, and your data will be less likely to be collected and used without your consent.

To enable tracking protection in Internet Explorer, go to the Tools menu and select Internet Options. On the Privacy tab, click the Tracking Protection button. You can then choose to enable tracking protection for all websites, or only for certain websites that you trust.

Enabling tracking protection can help to keep your data safe and your privacy protected. So if you're concerned about online privacy, be sure to enable this feature in your web browser.

Learn more on internet explorer here:

https://brainly.com/question/28431103

#SPJ4

Technology that uses the internet to control home automation networks including your garage door, lights, and heating system from your cell phone is the of?

Answers

Technology that uses the internet to control home automation networks including your garage door, lights, and heating systems from your cell phone is the Internet of Things.

What is technology?

Technology can be defined as a field of science that involves the process of creating, applying, and managing scientific knowledge and ideas, so as to effectively and efficiently proffer solutions to various problems and cause an improvement in human life.

What is the Internet of Things?

The Internet of Things can be defined as a type of modern technology that is based on the interconnection of various physical objects with sensors through the internet, in order to enable them send and receive data while proffering a solution to a particular problem.

Read more on Internet of Things here: https://brainly.com/question/27796474

#SPJ1

Complete Question:

Technology that uses the internet to control home automation networks including your garage door, lights, and heating systems from your cell phone is the ______ of _______.

________ is the process of sorting, grouping, summing, filtering, and formatting structured data.

Answers

Report analysis is the process of sorting, grouping, summing, filtering, and formatting structured data.

What is reporting analysis?

An analytical report is a type of report or evaluation of a particular set of circumstances that relate to a company's performance. Data is collected, analyzed, and presented to determine what the next course of action should be taken.It's a analysis that will makes the decisions for business through various insights.Analytical reports are based on historical data, statistics and provide predictive analysis for a specific issue.The major component of report analysis are:Abstract or SummaryIntroductionReview of LiteratureMethodsResultsConclusions and DiscussionReferences

So, Report analysis is the process of sorting, grouping, summing, filtering, and formatting structured data.

Learn more about Report analysis,

https://brainly.com/question/14954024

#SPJ1

Enterprise information systems are also known as collaborative systems. true /false

Answers

Enterprise information systems are also known as collaborative systems is a false statement.

What systems are also known as enterprise systems?

An enterprise system is known to be a term that is said to be also known as an enterprise resource planning (ERP) system.

Note this enterprise system is seen as a kind of a cross-functional information system that tends to give organization a form of larger scope as well as the coordination and the integration of some central business processes and aid them in the area of planning the resources of any given organization.

Note that Enterprise information systems are also known as collaborative systems is a false statement because it is an enterprise resource planning (ERP) system.

Learn more about Enterprise information systems from

https://brainly.com/question/14688347
#SPJ1

_______ can identify key pieces of information like who created a file, when it was created, when it was last modified, and what the current status is.

Answers

File properties can identify key pieces of information like who created a file, when it was created, when it was last modified, and what the current status is.

What are the key properties of a file?

The term file properties is known to be called Document properties or  metadata. It is known to be one that often gives details about a file.

Files do have the characteristics of:

A file name.A file do take storage space.A file can be saved in different format.

Therefore, File properties can identify key pieces of information like who created a file, when it was created, when it was last modified, and what the current status is.

Learn more about File properties from

https://brainly.com/question/1165635
#SPJ1

Describe the excel spreadsheet you would set up to calculate the joule- thompson coefficient from the experimental observations.

Answers

To calculate the Joule-Thompson coefficient from experimental observations, I would set up an Excel spreadsheet with the following columns:

Temperature (K): This column would list the temperatures at which the experimental observations were made.

Pressure (Pa): This column would list the pressures at which the experimental observations were made.

Volume (m3): This column would list the volume of gas observed at each temperature and pressure.

Joule-Thompson coefficient (K/Pa): This column would list the calculated Joule-Thompson coefficient at each temperature and pressure.

To calculate the coefficient, I would use the following formula:

Joule-Thompson coefficient = (Temperature / Pressure) * (Volume / Temperature)

This spreadsheet would allow me to quickly and easily calculate the coefficient from the experimental observations.

Learn more on spreadsheet here:

https://brainly.com/question/25863198

#SPJ4

Other Questions
A certain hybrid car can travel 1 9/11 times as far as a similar no hybrid car will on one gallon of gasoline . If the non hybrid car can travel 33 miles per gallon of gasoline, how far can the hybrid travel on 4/5 gallon of gasoline ? A firm that enhances a commercial package by adding custom features and configuring it for a particular industry is called a(n) ____. -x-12-3 or -62-x-1< need help with this please Practice & Problem Solving C 8. 8. Leveled Practice Find the rational approximation of V15. a. Approximate using perfect squares. please help, I need answers asap due tonight What insights into life do you think the ancient people who heard this epic gained gilgamesh? Which is a factor of 6z^2 -3z-2+4z?A:2z+1B:3z-2C:z+2D:2z-1 My question is what is 3+(-7) Draw the structural formula for cis-1,3-dimethylcyclopentane Under the articles, the judicial branch was a powerful force in the federal government.true/ false A group of words with a subject and verb that does not express a complete thought is called a(n) An income statement reflects activity that occurs _____ while a balance sheet reflects values ____. How do I factor 7.2x2y - 0.9xy2 the length l cm of a sheet of paper is 29.7 cm,corredt to the nearest millimetre complete this statement about the value of l The _____ are receptors in the retina that function especially well in low-light conditions and are everywhere in the retina except for the fovea. A company's beginning accounts payable is $1,000. it had a $10,000 of purchases on account and paid $7,000 of the amounts owed. the accounts payable ending balance equals a _____ balance. the debate about whether government agencies shoudl be permitted to collect private communication data is most closely related to the american value of Which ux design role focuses on designing the experience and functionality of a product? The dietary supplement and health education act of 1994 allows manufacturers to classify nutrient supplements and herbal products as? You own a mobile Taco Truck. You have a short list of competitors. Which TWO would be considered your Indirect Competition? Question 3 options: Walk-up Mexican Food stand A local Burger King franchise A local Taco Bell franchise Mobile Fish and Chips Truck How well a speech is organized likely will influence?