Ccna which level of the internet of things reference model describes data storage?

Answers

Answer 1
 The Internet of Things (IoT)) reference model provides clear definitions and descriptions for all elements and functions in the  IoT systems and applications.
Level 4 of the IoT reference model, called  Data Accumulation describes the data storage. This fourth level captures data and puts it at rest.So it is now usable by applications on a non-real-time basis.

Related Questions

Which one of the following is true about employer responsibility in providing fall protection to workers? not selected A. Employers can only use guardrails as a primary method of fall protection not selected B. Employers have flexibility in choosing a fall protection system they believe will work best in a situation selected C. Employees have the right to choose appropriate fall protection methods that suit them for the job

Answers

Option B is the correct answer, Employers have flexibility in choosing a fall protection system they believe will work best in a situation selected. It is the primary duty of employer to provide safety to its workers. Employers must setup a suitable protection system at workplace from falling off from overhead platforms and from elevated workstations during construction for safety of its employees.  

Further Explanation:

⦁ Employer must ensure compliance to OSHA-Fall protection in construction.

⦁ Generally, fall protection must be ensured by deploying guardrail systems at the edge of construction sites, safety systems built by nets or personal fall arrest.

⦁ OSHA requires to built fall protection system irrespective of fall distance to make sure safety conditions for workers/ employees.

Answer details:

Grade: High School

Subject: Computer Science and Technology.

Learn More:

Fall protection and compliance to OSHA rules and regulations

https://brainly.com/question/8910167

Employer responsibility in providing fall protection

brainly.com/question/5872956

Key Words: Fall protection, OSHA, workplace safety, guardrail systems etc.

Image of guardrail as an example is attached.

The correct option about employer responsibility in providing fall protection to workers is employers have flexibility in choosing a fall protection system they believe will work best in situation selected.

The fundamental responsibility of employers is to provide safety to their workers. They must provide a secure workplace to the workers from falling off from overhead platforms.

Further Explanation:

Workers have some rights regarding their safety as below:

Working condition should be out of serious danger. Workers must have information about workplace hazards and also method to prevent from danger. Analysis of record of data of illness and injuries during work time. Workers must know their rights under the law. They can also file a complaint asking OSHA to check the workplace if they feel any security hazards.

Therefore, falls are most common reason of several injuries and death in workplace. Employers must follow proper guidelines to prevent from these serious danger.

Learn more:

1. Fall protection and compliance to OSHA rules and regulations

brainly.com/question/8910167

2. Employer responsibility in providing fall protection

brainly.com/question/5872956

Answer details:

Grade: High School

Subject: Computers and Technology

Chapter: Employee Safety

Keywords:

Work place, OSHA, health, injuries, illness, complaint, employer, overhead platform, responsibility, danger, workers, hazards, security, rights, prevent, safety

The first step in creating photographs with good backgrounds is which of the following? Learning to see the background before taking the photograph Lowering the perspective so that more of the foreground is shown Adding more color to the photograph to keep attention away from the background All of the above

Answers

Oh I got this! I'm a professional photographer! The answer is Leaning to se the background before taking the photograph.

Plz mark brainliest! So glad I could help, and Have an AWESOME day!!!

The first step in creating photographs with good backgrounds is by learning to see the background before taking the photograph.

What would be the first step in creating photographs?

The first step to be able to make the backgrounds better in our photos is to be very conscious of how  the background's  is to any photos.

Therefore, it is better to have the first step in creating photographs with good backgrounds is by learning to see the background before taking the photograph.

Learn more about photographs from

https://brainly.com/question/25821700

#SPJ2

Which type of navigation involves multiple frames that are linked to a number of other frames?

A) bread crumbs
B) linear
C) reciprocal
D) web



Which type of navigation is similar to a book because users can move back and forth between frames?

A) hierarchical
B) linear
C) reciprocal
D) sequential


How many items should a menu system have?

A) 1-3
B) 5-8
C) 9-11
D) 13-18

Answers

not sure about 1 and 2 but im pretty sure 3 is B) 5-8

Based on the relational model, create the database metadata as part the physical designphase.b)from the metadata, write the sql create database and table statements (ddl) for all entities (tables).c)implement the tables in your mysql db.

Answers

Which is not a component of a database that describes how data is stored?

Why does a computer not understand physical variables (real world) read from sensors?

Answers

The reason why a computer does not understand physical variables read from sensors because they are only capable of having to handle and work on analogue and in order for them to understand, a digital converter is needed by the device in means of having to understand the given data.

Which type of software provides more control over text and graphic placement in the layout of a page than word processing software? data management software presentation software graphics software spreadsheet software desktop publishing software previous next?

Answers

i love microsoft's Bissnuss software correction! 

For a device to be considered a kind of computer, it must have a _____.

monitor
processor
data store
thought center

Answers

it must have a Processor.

Calculate the average (as a double) of the values contained in the integer variables num1, num2, num3 and assign that average to the double variable avg. assume the variables num1, num2, and num3 have been declared and assigned values, and the variable avg declared.

Answers

avg = ( num1 + num2 + num3 ) / 3;

Final answer:

To find the average of the integer variables num1, num2, and num3 as a double, sum the variables, cast the sum to double, and divide by the number of variables, which in this case is 3.

Explanation:

To calculate the average as a double of the values contained in the integer variables num1, num2, and num3, you would first sum those values. Then, you divide the total sum by the number of items you have, which in this case is 3, since you're dealing with three values. The formula to calculate the average (avg) would look like this:

avg = (double)(num1 + num2 + num3) / 3;

Here, you are casting the sum of num1, num2, and num3 to a double to ensure the division is done using floating-point arithmetic, giving a double result which is stored in the variable avg. This is necessary because if the sum is not cast to a double, integer division would occur, potentially leading to an incorrect average due to truncation (cutting off the decimal points).

The hardware components that serve the input output and storage functions of a computer are called

Answers

The hardware components that serve the input-output and storage functions of a computer are called peripheral devices.

To create a digital file from an old photo, I would use a _____.

A. Printer

B. Scanner

C. Monitor

D. Modem

Answers

A scanner would create a digital file of the old photo.
The printer is used to create paper copies of a file which is the opposite of what we want. The monitor is used for output not input. And a modem is used to connect to the internet.
B. Scanner is your answer.

You created a vm and installed windows server 2008 r2 over the network, using pxe boot. when you start the vm, it doesn't attempt to boot from the network. what should you do?

Answers

Hehehdjekdjdbd besbbs

For a biology presentation, Sofia wants to summarize the various body systems and their key functions. Which element can she use to present this kind of information effectively?

Sofia can summarize the various body systems and their related functions with the help of (an audio clip, a graph, a table). She can also add a (chart, flowchart, bulleted list) to display the process of digestion from beginning to end.

Answers

i still say its table and bullet lst

The first answer is a table

The second a bulleted list

Your computer is configured to obtain an ipv4 address and dns server address automatically. what utility will help you to find the ipv4 address of your computer?

Answers

ifconfig -a # windows: ipconfig /all

ip addr

Final answer:

To find your computer's IPv4 address, you can use the Command Prompt on Windows or Terminal on Mac and Linux, executing 'ipconfig' or 'ifconfig' respectively.

Explanation:

To find the IPv4 address of your computer, one effective utility you can use is the Command Prompt on Windows or Terminal on MacOS and Linux. This utility allows you to execute commands that can retrieve system information, including your computer's IP address.

For Windows users, you can open the Command Prompt by searching for 'cmd' in the start menu. Once opened, type the command 'ipconfig' and press enter. Your computer's IPv4 address will be listed under the relevant network adapter, typically labeled as 'IPv4 Address'.

For MacOS and Linux users, you can open the Terminal. In this utility, type the command 'ifconfig' for Linux or 'ipconfig getifaddr en0' for MacOS and press enter. Your IP address should be displayed as a result of this command.

These commands are straightforward ways to retrieve your computer's IP address without needing to navigate through various menus in your system's settings.

Lately, Sylvia's home computer is super slow, and it restarts and shuts down without warning. The computer probably has a __________.

Answers

It may have a bad disk drive. Probably is an awfully strong word.

Internet protocol (ip) operates at the _____ of the open systems interconnection (osi) model.

Answers

Final answer:

Internet Protocol (IP) functions at the Network layer of the OSI model, where it is responsible for routing packets, including logical addressing, to ensure they reach the correct destination.

Explanation:

The Internet Protocol (IP) operates at the Network layer of the Open Systems Interconnection (OSI) model. The OSI model is a conceptual framework used to understand and standardize the functions of a telecommunication or computing system without regard to its underlying internal structure and technology. The Network layer is responsible for packet forwarding including routing through intermediate routers. IP is one of the primary protocols in this layer, and it is tasked with delivering packets from the source host to the destination host based on the IP addresses in the packet headers. IP provides logical addressing which is necessary for a packet to traverse across networks and reach the correct destination.

Custom parameters 1, 2 and 3 provide the same end value for all keywords. true or false?

Answers

Is a Microsoft Bing ads certification Exam question.
I think that the correct answer is:
False

Source and more info: https://goo.gl/JUw7Bw

Which action should you take when sending a large attachment?

Answers

Cancel out other tasks, let the internet focus upon the one attachment.

Desktop operating systems sometimes are called ______ operating systems because they also work in conjunction with a server operating system.

Answers

Client, because they are a part of the server operating system request line. The client asks for a request for information or data from the provider (the server) and the server provides this to its client (the desktop computer). They work together hand in hand one is recieving information and one is sending information

Print speed is typically measured in ____.

Answers

pages per minute (ppm) 
dots per second (dps) 
pixels per minute (ppm) 
characters per second(cps)

Which behavior could be acceptable at a classical concert as well as at a ball game? standing for an exceptional performance cheering for your favorite performer talking throughout the event eating during the event

Answers

Standing for an exceptional performance would be normal "acceptable" in both scenarios.

I believe it would be B As well as A but...

We all have our favorite athlete and singer so..

personally i believe the answer is:

B) cheering for your favorite performer

What are the main routing protocols used on internet?

Answers

Interior gateway protocols type 1, link-state routing protocols, such as OSPF and IS-IS.
Interior gateway protocols type 2, distance-vector routing protocols, such as Routing Information Protocol, RIPv2, IGRP
Exterior gateway protocols are routing protocols used on the Internet for exchanging routing information between Autonomous Systems, such as Border Gateway Protocol (BGP), Path Vector Routing Protocol. Exterior gateway protocols should not be confused with Exterior Gateway Protocol (EGP), an obsolete routing protocol

true or false over the course of ecological succession,species diversity increases over time?

Answers

yes becasue the diversity usually increases over time
This is True and i know it as a fact

How does having constraints placed on a design change the engineering process

Answers

Having constraints on a design will change the engineering process and the process will take a long time to finish. The process eats up time, quality and budget especially when it involves prototypes and the like. Some common constraints involve the design itself and the engineer. 

Design constraints refer to the conditions that are required for a particular project to be successful.

Design constraints help in narrowing the choices that the engineer will have to make. Even though the project manager in charge can view the design constraints as something negative, it helps in shaping the project and meeting the client's exact needs.

Some of the design constraints that engineers consider include environment, safety, health, political etc.

In conclusion, design constraints are vital to the design process as they help in limiting the design space as unacceptable alternatives are excluded.

Read related link on:

https://brainly.com/question/17233166

A _____ network is one in which all network devices are connected to one another through a single central device called the hub node.

Answers

Answer: Switch

Explanation: A switch a device that connects devices together on a computer network, by using packet switching to receive, process and forward data to the destination device.

Source:  Networking _ Hardware Encyclopedia

Read carefully, is it a he or she?

Answers

I think there's a typo in the question, otherwise they probably meant a 'she', since the name is Maureen.

Also, the answer is Personal hygiene and grooming.
I believe its a girl or a she

The master system database stores a database template that is used as a blueprint when creating a new user database.

Answers

An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a

What determines the keystroke to open a cmos editor? how can you find this information?

Answers

Determining the keystrokes of opening the cmos editor depends on the ram contained in the parameters in BIOS.It can be a very daunting task however made more accessible by instructions detailed in various ways by others.Research is needed.

which course must first-time drivers in florida take to be eligible for their learners license?
a. effects of alcohol safety course
b. thirty-hour driver education course
c. traffic law and substance abuse education (TLSAE)
d. DUI-DWI resistance and prevention

Answers

C) traffic laws and substance abuse education

C. Traffic Laws and Substance Abuse education

Janith is creating a spreadsheet with the names, locations, dates, and costs of summer camps she is interested in attending. What is the most efficient way to also add pictures, camper reviews, staff information, activity schedules, and menus?

Answers

Answer:

Hyperlink camp’s web page.

Explanation:

Considering all the changes Janith wants to make to the document, the most effective way is to add hyperlinks from the web page in excel. Adding a spreadsheet or even a column to your document may not be the ideal way to add images or to meet your needs, so by adding a hyperlink to the excel webpage, you are assured of better images and the ability to update content as needed. , and the customer can view at the same time.

________ is installed on your computer, and when the program is opened, your e-mail downloads to your computer.

Answers

An email client is installed, like Microsoft Outlook for example.

Answer:

E-mail client

Explanation:

The mail client is responsible for communicating with the mail server, picking up the messages that have reached the electronic mailbox and displaying them in an orderly manner so that they can be read comfortably. It also allows you to write new messages and is also responsible for delivering them to the mail server so that it can channel them to your destination

You can distinguish three types of mail clients according to the way to access them:

Installed on a PC. They run directly from a personal computer. On personal computers that have Windows / xx as an operating system, mail clients will be versions for Windows such as: Eudora, Pegasus, Messenger (Mozilla), Messenger (Netscape), Outlook (Microsoft), Outlook Express (Microsoft), Exchange ( Microsoft).

Residents on the server. It requires connecting to the server by remote terminal using encrypted connection (ssh, which is the preferred option), or simple connection (telnet, anzio, netterm, qvtnet). Once the remote terminal of the server is opened, one of the mail clients installed on it runs.

Through the Web From a web browser you can access, through a web-secure (encrypted) connection, the messages received, as well as send new messages.

Other Questions
what year was the magna carta signed in and what was its purpose? the list of complaints makes up the largest part of the documents structure, or pattern of organization. what does its structure contribute to jeffersons argument? how does it reinforce his main idea What is a false cognate? The process of converting an amount given at the present time into a future value is called What is the total flow (loads per week) between department y and department z? What is the product of 7.5 and 1,000? What color background was common in Byzantine paintings? A number cube is rolled and a marble is selected at random from the bag at he right. Determine each probability. Which of the following shows the correct order of the number below (1/2)^2, 2/3,0.45A. (1/2)^2 The hyphen in "one-time winner" is used because: To nullify means to make something validTrue False A cell spends approximately _____ of its cycle in the M phase. When rubbed against a silk cloth, a glass rod loses electrons. How does this affect the charges of the glass rod and the silk cloth? What shape is the shadow that the sun cast on the side of the temple of Kukulcan why do you think the government is concerned with the definition of unemployment ? It takes 40 min for a bus to travel the 36 miles from Framingham to Worcester. A car traveling from Worcester to Framingham moves 1.5 times as fast as the bus. If the car and the bus start moving towards each other simultaneously, after how many minutes will they meet? The memory type most closely associated with motor skills, habits, and unconsciously learned rules is: Plz help! 2 questions!! A machine is wrapping 18 boxes in 5 minutes. If the machine continues at the same rate, how many boxes will it rap in 25 minutes ? A.38 B.90 C.23 D.72 Chris is making lemonade. The directions say to mix 5 cups of water with 2 scoops of powdered lemonade mix. How many cups of water should he use with 2.5 scoops of fruit mix? A.6 B.6.25 C.6.5 D. 6.75 Why did Thomas Jefferson oppose re-chartering the Bank of the United States in 1811? Read these lines from Canto IX:For now there came upon the muddy wavesA blasting sound, a fear-inspiring roar,Causing both sides of the shore to tremble...What literary device does Dante use in these lines to enhance the reader's understanding of the scene? A.Allegory B.Allusion C.Symbolism D.Imagery Steam Workshop Downloader