Which layer of the osi model defines services to segment and reassemble data for individual communications between end devices?

Answers

Answer 1
Answer: the Transport Layer

Related Questions

how is a rocket propelled through space?

Answers

Rockets and engines in space behave according to Isaac Newton's third law of motion: Every action produces an equal and opposite reaction. When arocket shoots fuel out one end, thispropels the rocket forward — no air is required. NASA says this principle is easy to observe on Earth.Apr 
with fuel and combustion?

Which button limits your search to the files and folders in your storage locations on the device being search?

Answers

The answer is the Search Tools tab. It is a tab that appears in the File Explorer window after you click the Search text box; it lets you identify a specific search location, limit your search, repeat previous searches, save searches, and open a folder containing a found file.

Unwanted web pages that appear automatically while you are attempting to browse something else are called

Answers

The answer to this question is Pop up ads. Pop up advertisements are a form of advertisement in the internet or world wide web. Pop up advertisements are usually in a window type form where advertisements in the internet open. Pop-up ads are used by some advertisers to encourage internet users to encourage people to sign up to their newsletters or email subscriptions. 

Is microsoft word the same as microsoft office?

Answers

Hey there!

Microsoft Word is considered a part of Microsoft Office. Office is a package of Microsoft applications that can be used on Windows or MacOS that includes Word, PowerPoint, Excel, Outlook, and many other programs used for either personal or commercial use. Microsoft Word is just one of those programs, so, no, they're not the same thing. 

Hope this helped you out! :-)

Answer:

Microsoft Word is a software inside of Microsoft Office.

Explanation:

Microsost office has many softwares. Such as Microsoft Word, Microsoft Excel, Outlook, Microsoft Calendar, Microsoft Powerpoint, OneNote, Skype, and Sway.

On five lane roadways, the center lane is designated for __________ and is used by vehicles traveling in both directions.

Answers

Answer : The center lane is designated for left turns

Explanation: 
This lane is used so that drivers would pull into in order to turn left when a clear merge is available. Its main purpose is not to cause traffic jam while waiting for the chance to turn left. It is illegal to use this lane for any other purposes

The recommended flux for electrical soldering is?

Answers

The answer is Rosin.

The recommended flux for electrical soldering is typically a rosin-based or rosin-contained flux, which is non-corrosive and promotes the flow of solder by removing oxidation from the metal surfaces.

Recommended Flux for Electrical Soldering

The recommended flux for electrical soldering is typically rosin-based or rosin-contained, as these types of fluxes are non-corrosive and don't necessarily need to be cleaned off of electronics after soldering, provided it is not excessively applied. Flux is used in soldering to remove oxidation from the metal surfaces, which ensures a good solder bond between components and the board. In the context of electrical soldering with metals such as lead, tin, copper, and silver, the function of flux is especially critical as it promotes the flow of solder and improves the electrical connection.

How to bypass internety restrictions on xbox one?

Answers

Those restrictions are probably there for a reason. Might be best if you don't try to bypass them.
do you mean parental restrictions or internal firewall blockage because if parental restrictions then you need a pass code to do whatever it is that you need if it is a firewall then you need to download psyphon to get through and around the fire wall

What do radio telescopes use to gather and focus radio waves?

Answers

Parabolic dish Antennas.

The answer is : A Huge Dish

You should regularly ____ your files for ease of recovering files in case of computer damage

Answers

You should regularly backup your files for ease of recovering files in case of computer damage

Web site lists keywords and phrases in its web page headings that you and other web users are likely to use to find information on the web page.

Answers

This is true for some websites like wikipedia.  They have highlighted words on every document that you can click on to get more information about that word or phrase.

What are the benefits of using halogen lights bulbs in lighting fixtures for filming

Answers

The benefits of using halogen bulbs in lighting fixtures for shooting films is that they are tools with which you can create different lighting effects for films, also they have uniform color temperature which indicates the way in that appear in movies which is displayed throughout the scene and finally another benefit of halogen bulbs is that they have a longer life than incandescent bulbs. Halogens are the furthermost common as at ease to obtain and replace. Fluorescent lamps tend to have a green tone and need to be color corrected. To create the effect of light coming through a window on stage in a theater production, first it is necessary an ellipsoidal reflector which provides strong light, precise and defined which together with a gobo can shape the outline of a window. 

Final answer:

Halogen light bulbs are beneficial in filming for providing continuous, bright, and repeatable lighting, which helps control reflections and prevents camera shake. They are also cost-effective due to their inexpensive lamps, fixtures, and easy maintenance.

Explanation:

Halogen light bulbs have several benefits when used in lighting fixtures for filming. One major advantage is that they provide a continuous light source, which is always visible, unlike flash-based lighting. This allows for real-time visualization of surface reflections through the camera, empowering the cinematographer to control them effectively. Halogen bulbs are also known for offering a very bright and repeatable light source, which can speed up the filming process and significantly reduce the risk of camera shake due to long exposures.

Filming with halogen lights also boasts an economic benefit as the lamps and fixtures, such as ballasts and reflectors, are relatively inexpensive and easy to maintain. This includes simple bulb replacement and reflector cleaning, ensuring that the production can proceed smoothly without frequent equipment-related interruptions. Moreover, when comparing halogen lights to built-in flashguns on some cameras, halogen lights offer more uniform illumination and fewer issues with uneven lighting or reflections, particularly at close distances.

A ________ describes the data and relationships that will be stored in a database.

Answers

Your missing word is Data model.

Which osi model layer manages data encryption?

Answers

The presentation Layer manages data encryption.

What is a programmable logic controller (plc)?

Answers

A Programmable Logic Controller, or PLC, is more or less a small computer with a built-in operating system (OS). This OS is highly specialized and optimized to handle incoming events in real time, i.e., at the time of their occurrence.

PLC's control everything from MRI machines to the automotive industry, rollercoasters etc. including spinning of turbines in Nuclear facilities. Stuxnet was developed jointly by the US and Israel deployed to specifically target the PLC's in Iran's nuclear facilities, by reporting false data back to the control room and the centrifuges for separating nuclear material would be causing the fast-spinning centrifuges to tear themselves apart

Application programs can help users write their own programs in a form the computer can understand using a programming language such as visual basic, cobol, c++, java, or ____.

Answers

another well know example could be python

Application programs can help users write their own programs in a form the computer can understand using a programming language such as visual basic, COBOL, c++, java, or Python.

What is a Programming Language?

A programming language is a set of instructions for dealing with and controlling a computer. These technologies are used to generate websites, applications, operating systems, spacecraft control, and data analysis. Because computers cannot understand English, application programs are required. Programming languages let developers transform their orders into something that the computer can comprehend and execute.

As per the question,

Application programs can assist users in writing their own programs in a programming language that the computer performs, such as visual basic, COBOL, c++, java, or Python.

Thus, the required fill-in-the-blank would be Python in the given sentence.

To learn more about the Python Program click here:

brainly.com/question/15061326

#SPJ5

What are the two basic windows 8 settings for network security?

Answers

The two basic windows 8 setting for network security are Public and private network. The private network settings mean that you can link home group and make remote desktop connections. Public network settings entail the greatest privacy. You should make sure file or device sharing is disabled for having data copy.

 

 

An objective test or measurement that technology product evaluators use to compare two or more products is ____.

Answers

An objective test or measurement that technology product evaluators use to compare two or more products is benchmark. The benchmark is set of standards which are used to compare two products. Several parameters are measured in order to compare the products and to define the weak points where improvements can be done. The obtained information form the test is used to improve performance. 

One unique anatomical feature of cardiac muscle, which isn't seen in skeletal or smooth muscle, is

Answers

The answer to this question is the Intercalated disks.

Intercalated discs are also known as the gap functions. Intercalated discs are microscopic details of the cardiac muscles. Intercalated discs functions as a connector in the two adjacent cardiac cells. This also contains membrane junctions which are the fascia adherens, gap junctions, and macual adherens.    

A service like that provided by google, which searches the internet but provides little original content,

Answers

The answer is AGGREGATOR which is a website that provides search an aggregation services but creates little or no original content. On the internet, news organizations that employ reporters and create articles are known as content providers, because they provide original content. Unfortunately for the content providers, they collect only a small share of the total revenue from online advertising. Most ad revenue goes to aggregators, such as google that provide search and aggregation services but generate little or no original content. 

Secondary storage devices that are input and output devices include all except:

Answers

Output devices. You're welcome

Here is a Test Code segment:

public class MyTesterClass
{
public static void main(String[] args)
{
MyClass myObject = new MyClass (12.4, 20);

int value1 = MyClass.SOME_VALUE;
int value2 = myObject.method1();
int value3 = MyClass.method2(20);
}
}

I'm trying to figure out what part of this code is a "CLASS METHOD" and I'm tempted to guess it's method2... It could also be MyClass, SOME_VALUE, or method1 I believe. I'm not the best with coding classifications and would like some help.

Answers

Final answer:

In Java, a class method is identified by the static modifier and the method 'method2' in the code is a class method, called using the class name MyClass.

Explanation:

In the provided code segment, the class method is method2. Class methods in Java are usually identified by the static modifier in their declaration and can be called using the class name instead of an instance of the class. The line int value3 = MyClass.method2(20); indicates that method2 is being called on the MyClass class itself, rather than on an object instance such as myObject. The SOME_VALUE variable is likely a static variable, also known as a class variable, because it's being accessed with the class name. method1, on the other hand, is an instance method since it is being called on the myObject instance of MyClass.

In Java, a class method is defined using the static keyword and belongs to the class itself. In your code example, method2 is the class method because it is called directly on the class, MyClass.

Understanding Class Methods in Java

In Java, a class method is a method that belongs to the class itself instead of instances of the class. These methods are defined using the static keyword. In your code example:

MyClass myObject = new MyClass(12.4, 20); - This creates an instance of MyClass and calls the constructor. This is not a class method.int value1 = MyClass.SOME_VALUE; - This accesses a static variable SOME_VALUE directly from the class. This isn't a class method but a class variable.int value2 = myObject.method1(); - This calls method1 on an instance of the class. This means method1 is an instance method.int value3 = MyClass.method2(20); - This calls method2 directly on the class MyClass. This is indeed a class method as it is called on the class itself

Therefore, method2 is the class method you are looking for.

A ________ is a sketch or blueprint of a web page that shows the structure (but not the detailed design) of basic page elements such as the logo, navigation, content, and footer.

Answers

A live preview display I belive

A wireframe is a blueprint of a web page showing the structure of basic page elements without detailed design. It includes elements like the logo, navigation, content, and footer. This step is crucial in the web design process.

A wireframe is a sketch or blueprint of a web page that shows the structure (but not the detailed design) of basic page elements such as the logo, navigation, content, and footer.

Understanding Wireframes :

Like a sketch of an item we want to make, a wireframe outlines the basic structure of a web page. It typically includes various elements like:

LogoNavigationMain Content AreaFooter

Wireframes are focused on content elements and their locations, rather than specific styles, colors, or actual content. This step is essential in the web design process as it ensures that the website's layout meets the needs of users before detailed design work begins.

In the osi model, which layer is at the bottom and represents the hardware that forms the network?

Answers

Answer =The Physical Layer

If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the packet to its default route, if configured.

Answers

If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the packet to its default route, if configured.
Answer: That statement is Ture

The ____________ is a wildcard character that is used to search for an unknown single character.

Answers

asteristik or as we see as (*)

Are the minimum hardware and software specifications required to run a software application

Answers

System Requirements? Not really sure what you're trying to ask here.

In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding.

Answers

Asymmetric-key encryption utilizes a key pair consisting of a public key for encryption and a private key for decryption, enabling secure exchange of information without sharing the private key.

In asymmetric-key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for decoding. This form of encryption uses a public key for encrypting data and a private key for decrypting it. The unparalleled advantage of asymmetric encryption is that it allows for secure communication without the need to share the decryption key.

The public key can be shared with anyone, while the private key is kept secret by the owner. When a message is sent, it is encrypted with the receiver's public key, and can only be decrypted by the receiver's private key, hence maintaining confidentiality and data integrity.

One significant application of asymmetric encryption is in Diffie-Hellman key exchange, which is designed to secure data exchange over an insecure channel. This method involves the sender encrypting the information with the receiver's public key, and the receiver using their private key to decrypt the information.

What is the name of the first graphical user interface (gui) web browser widely available for pc's, which was developed by a group of students led by marc andresessen at the university of illinois?

Answers

Mosaic was the first browser developed by Mark Anderson.

Which type of software supports the application software and manages how the hardware devices work together?

Answers

Operating system software

Answer:

Operating system

Explanation:

To display rows from one table that do not have a corresponding row in the other table, you must create a(n) ____________________ join.

Answers

To display rows from one table that do not have a corresponding row in the other table, you must create a(n) __________outer__________ join.
Other Questions
What is the radius of a sphere with a surface area of 100cm2? 10 cm 5 cm 25 cm 3 cm? PLEASE ANSWER-Which Founding Father attempted to take Fort Duquesne and, in doing so, ignited the French and Indian War?A.James MadisonB.Thomas JeffersonC.George WashingtonD.Benjamin FranklinIn terms of territory won in the French and Indian War, which of the following is a true statement?A.England won the most territory as a result of the war.B.France won the most territory as a result of the war.C.Spain won the most territory as a result of the war.D.England, France, and Spain all won an equal amount of territory as a result of the war. To be concerned with worldly matters rather than spiritual matters is to be The principle that states that two different species cannot occupy the same niche in a given habitat is called what The variable Z is inversely proportional to X. When X is 6, Z has the value 2. What is the value of z . When x = 13Round to at least the thousandths place if needed. The length of of a rectangle is 10mm and the width is 2.5mm, what is the area una pizzeria hace pizzas de varios tamaos y las vende en cajas hexagonales de 39 cm de lado y 4.7 cm de alto que cantidad de cartn se anestesia para cada caja teniendo en cuenta q la caja esta formado por dos partes compuestas de una base lateral ? Some physician practices will bill at rates from 100% of medicare to 500% of medicare. which one do you think is correct and why? discuss what are you going to look for and why? Ray and lilli are designing their own shoes. They have 4 color options for the base and 6 color options for the accent. They can also pick 2 fonts for the embroidery. What is the probability that ray and lilli design identical shoes? Suppose you draw a card from a well-shuffled pack of playing cards. What is the probability the card you draw will be an ace? A. 4/50 B. 1/13 C. 4/13 D. 1/52 How is the following passage from a compare-and-contrast essay organized?Dogs ands cats actually have a lot in common. One of the most obvious similarities is their general existence as pets. In other words, they are both domesticated. Also, they both have fur. Whether they have long or short hair, or scruffy or soft hair, dogs and cats both have coats to maintain.by chronological orderpoint by pointsubject by subjectby order of importance An acute angle is in a right triangle with sin = two thirds . What is the value of cot ? This type of nervous tissue contains neuronal cell bodies, dendrites, unmyelinated axons, axon terminals, and neuroglial cells. gray matter white matter nissl bodies ganglia nuclei Answer this question in three to four sentences.How do Romeos banishment and the change in Juliets wedding date affect the central conflict of the play? Researchers want to use eDNA to look for an invasive species in a waterway. Which step should they do first?A.Collect water samples from the waterway in question.B.Cut the DNA into fragments of different sizes.C.Compare samples with a positive control.D.Stain the gel to reveal a banding pattern. If you are in a rear-wheel skid, you must release your brakes and turn your steering wheel __________a. into the direction of the skid.b. opposite direction of the skid.c. straight. Select 2 examples of reactive languageI can'tI'll do itThere's gotta be a wayI chose toYou ruined my day A ship at sea, the Gladstone, spots two other ships, the Norman and the Voyager, and measures the angle between them to be 44. The distance between the Gladstone and the Norman is 4510 yards. The Norman measures an angle of 36 between the Gladstone and the Voyager. To the nearest yard, what is the distance between the Norman and the Voyager? ~~20 Points~~ If c is a constant such that x^2+25x+c is equal to the square of a binomial, then what is c? Based on chapter 5 The Adventures of Huckleberry Finn, which best describes why the novel is considered a realist work? Steam Workshop Downloader