It uses network usage monitoring software to know the level of traffic on that local network.
We can arrive at this answer because:
Network monitoring is an important activity to avoid overloading or underutilizing a local network.This allows the network to be manipulated to promote good performance and provide adequate traffic to users.To know the level of use of a network it is necessary to use network monitoring software. An example of this type of software is the Capsa Network Analyzer, which also allows the elaboration of strategies to increase, stabilize or decrease network utilization.
More information:
https://brainly.com/question/8118353
true or false? multimedia components such as audio and video do not significantly contribute to increased computer network traffic.
Answer:
false
Explanation:
are you KIDDING ME? imagine streaming a 4k video through YT.. yeah you know how much storage and bandwidth that takes up? it is VERY BIG. this is false
multimedia components such as audio and video do not significantly contribute to increased computer network traffic. The statement is false.
What is multimedia ?Multimedia is an user engaging type of media which offers a variety of effective ways to give information to user and user can interact with digital information through it.
Multimedia can act a communication tool, it has many application like Education, training, reference materials, corporate presentations, marketing, and documentary application.
Multimedia use text, audio, video, graphics, and animation to give information in a dynamic way and it is a technological way of presenting information with textual data like video conferencing, Yahoo Messenger, email, and the Multimedia Messaging Service ( MMS Service (MMS).
For more details regarding multimedia, visit
https://brainly.com/question/9774236
#SPJ2
what is pascaline ?
also called Arithmetic Machine, the first calculator or adding machine to be produced in any quantity and actually used. The Pascaline was designed and built by the French mathematician-philosopher
What is the purpose of formatting charts?
changes the data set used for creating the chart
changes the look and feel of the display
changes the values in the data set
changes the type of chart used
Intro
Don
Answer:
Changes the look and feel of the display
Explanation:
Because you don't change the data nor the values in the char
And it does not change the type of chart.
cual es la diferencia entre tala y poda
Answer:
talar es talar árboles
y podar podar sesped
Basic computer programs used by a variety of companies include:
Spreadsheets
Podcasts
iTunes
Videos editing
Pick one please
Answer:
spreadsheets
Explanation:
every company uses spreadsheets because they are used to list and organize data easily
Give a brief explanation about the internet.plsssss
Answer:
The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.
Explanation:
INTERNET is a short form of Interconnected Network of all the Web Servers Worldwide. It is also called the World Wide Web or simply the Web.
Several small stores rent space within a larger shopping centre. The owners of the shopping centre have provided a physical network throughout the entire centre.
(a) Explain how virtual networking can be used to give each store a private logical network. Diagrams may be used in your answer.
Answer:
okay so my first question is what is this question for because I cant really answer without more info
On average, people spend about _____ minutes per day on apps that do not make them feel good such as apps for dating, social networking, gaming, entertainment, news, and web browsing .
Averagely, people (end users) spend about 27 minutes per day on software applications (programs) that do not make them feel good.
A software can be defined as a collection of data or set of executable instructions (codes) that is typically used to instruct a computer on how it should perform a specific task and solve a particular problem.
Basically, software applications (programs) are broadly categorized into three (3) main groups and these are;
System softwareUtility softwareApplication softwareAn application software is typically designed and developed for the performance of a specific task rather than the operation of a computer system.
According to an American survey, people (end users) averagely spend about 27 minutes per day on software applications (programs) that do not make them feel good such as those focused on:
Social networkingDatingEntertainmentGamingNewsWeb browsingOn the other hand, people (end users) averagely spend about 9 minutes per day on software applications (programs) that make them feel good such as those focused on:
HealthExerciseReadingRelaxationEducationFind more information: https://brainly.com/question/14379808
A backup utility can ensure that data is not lost if your computer or disk drive
fails. *
True or false
__________ is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.
Answer:
bandwidth is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.
web browsers save website information in their _________, which helps the site load faster on future visits.
Answer: cache
Explanation:because I took the quiz
How do Machine Learning (ML) and Artificial Intelligence (AI) technologies help businesses use their enterprise data effectively?
Machine learning and Artifical intelligence helps develop models which are capable of learning continously on its own , hence, progressively getting better based on the amount and correctness of the data. Hence, artifical intelligence and machine learning models helps enterprise to draw insightful pattern from their data, capable of driving enterprise growth.
Models created using these automation technology continously learn from enterprise data, which they convert to reasonable insight which can help enterprise deduce lapses in business and foster business growth.
Hence, machine learning and artificial intelligence helps put enterprise data into good use.
Learn more : https://brainly.com/question/15584994
1. Give a natural number x. Display the last digit of 3 at the power of x. 2. Give a natural three-digit number. Calculate the sum of the digits and check if the sum is perfectly square
in c++
Memory of your familiar old e-mail password may block the recall of your new password. This illustrates
Answer:
Retroactive Interference
Explanation:
Memory of your familiar old e-mail password may block the recall of your new password, This illustrates a phenomenon known as proactive interference.
Proactive interference occurs when previously learned information interferes with the recall or retrieval of new information.
The memory of the familiar old e-mail password is interfering with the recall of the new password.
The interference happens because the old password is already deeply ingrained in the individual's memory, and when trying to recall the new password, the old password comes to mind automatically and hinders the retrieval of the correct information.
This interference can lead to forgetting or temporarily blocking the recall of the new password.
To learn more on Proactive interference click:
https://brainly.com/question/30320488
#SPJ6
PLEASE HELP!!! DECENT AMMOUNT OF POINTS!! DRIVERS ED
An automatic transmission is a mechanism that
A. automatically turns on your car
B. automatically turns off your car
C. selects the best gear for the situation
D. Connect your radio to air signals
Answer:
c. Selects the best gear for the situation.
Explanation:
Which invention provided instant communication and information to a massive audience for the first time? a. Intranet c. Video b. Television d. Internet Please select the best answer from the choices provided A B C D.
Answer:
B. television
Explanation:
Answer:bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb
Explanation:
In one to two sentences, describe how you would create a border around a group of cells.
Answer:
Select the cells you want to format. Click the down arrow beside the Borders button in the Font group on the Home tab. A drop-down menu appears, with all the border options you can apply to the cell selection.
to allow excel to change the cell references in a formula or function from row to row or column to column as you fill with it, you must use an ________.
to allow excel to change the cell references in a formula or function from row to row or column to column as you fill with it, you must use an formula cells.
You must utilize a cell formula to allow excel to modify the cell references in a formula or function between row to row or column to column as you fill it out.
Cell formula and Excel:A cell reference is a name for a cell or a group of cells on a worksheet that may be used in a formula to tell Microsoft Office Excel where to look for the values or data that the calculation should compute.
The cell function in Excel returns data about a cell in a spreadsheet. info type specifies the type of information to be returned.
Cell may obtain information such as the cell's address and filename, as well as specific information about the cell's formatting.
Find out more information about 'Cell formula'.
https://brainly.com/question/26988565?referrer=searchResults
What are the revised versions of water grinding mill and horse cart
Which of the following is not a view for interacting with a form object?
A. Datasheet view
B. Design view
C. Form view
D. Layout view
question
Which of the following is not a view for interacting with a form object?D. Layout viewhope it helps
Answer:
Layout view Layout view is a more visually-oriented view than Design view.
what should you consider when using a wireless keyboard with your home computer cyber awareness
A good practice is to protect data on your home wireless systems. What one should you consider when using a wireless keyboard with your home computer is Reviewing and configuring the available security features, including encryption.
An individual need to protect their information when using wireless technology. It can be done through avoiding the use of non-Bluetooth-paired or unencrypted wireless computer peripherals.The kind of information sometimes cause serious damage to national security in the event of unauthorized disclosure.
Learn more from
https://brainly.com/question/25349554
What contribution did ada byron make to computing?
Answer:
Around 1843, she described the first computer principles, later built by Charles Babbage in the form of a mechanical calculator.
State one technique for overcoming external fragmentation in dynamic partitioning. Why is this technique of overcoming external fragmentation considered inefficient
Compaction often gives solutions to the issues regarding external fragmentation.
One technique for overcoming external fragmentation in dynamic partitioning is
Compaction.
The reason why this technique of overcoming external fragmentation may be inefficient is because:
External fragmentation may need a lot of compaction and it is an expensive operation. The use of contiguous allocation is often hard to fit processes into memory and also it is so difficult to grow or shrink the amount of memory allocated to a process. Compaction only takes place when relocation is dynamic, and this also is expensive.Compaction often shuffle memory notes or contents and then put or pile them up all in free memory and in one large block.
External fragmentation takes place when free memory is removed into small blocks.
Learn more from
https://brainly.com/question/23636593
What are some ethical issues related to data mining? In other words, what are some ways that companies may gather or use data that are not appropriate?
___________________________________ allows many home users, corporations, and organizations around the world to connect far more computers to the Internet than they would otherwise be able to connect.
Answer:
network address translation
Explanation:
pretty sure nones gonna do this but please do it would gelp alot of my exams irs gonna bring me like 10 marks :(
A(n) ________ is a wonder of miniaturization combining a CPU, GPU, and sundry other support logic onto a single silicon die, saving a lot of space and power in the process.
Answer:
system on a chip (SoC)
Explanation:
Learning Objectives:
• understand when to use the different
print statements
• create a variable and assign it a value
• use Scanner to read in user input
• print the value of a variable using
printf
Output:
US state: Texas
Capital: Austin
The capital of Texas is Austin
Description:
Copy and paste the code below:
/*******************************************************
* Name:
* Assignment: A01
*******************************************************/
public class A01{
public static void main(String[] args){
// part1
System.out.print("x x x");
System.out.print("x o x");
System.out.print("x x x");
System.out.println();
// part2
}
}
Write your name in the comment on top. The red letters in the output are the user inputs.
This assignment consists of 2 parts.
First you demonstrate your understanding of the different print statements by modifying a
code segment. Then you read in two Strings and print a statement based on the user input.
Part1:
The code segment provided includes
three print statements that produce
the following output:
Change the code segment so that it
produces the following output:
Hint: you will need to change the number of
statements
Part2:
• Prompt the user to enter a state
• Read in the user response and assign
it to a String variable named state
Hint: before you can assign a value to the
variable state it needs to be declared
• Prompt the user to enter the name of
the capital
• Read in the user response and assign
it to a String variable named capital.
• Use printf and format specifiers to
print the following message:
The capital of state is capital
where you substitute state and capital with
the state and capital entered by the user.
Make your output look exactly like the output displayed above.
Make sure to read in the input next to the prompt but without touching it (use a blank to
separate the prompt from the user input). The output should use a single empty line to
separate the frog displayed in part1 from the output created in part2.
Answer:
take out the cord than put it back in than it shall work
why is it necessary to have a w-2 or 1099 form when using tax preparation software?
The reason why it is necessary to have a w-2 or 1099 form when using tax preparation software is to:
Allow the software engineer to report his incomeAccording to the given question, we are asked to show the reason why it is necessary to have a W-2 or 1099 form when a software engineer is preparing software.
As a result of this, we can see that these two forms are both used by the Internal Revenue Service so that individuals such as the software engineer can report their income and make their tax payments.
Read more here:
https://brainly.com/question/24749083
what is a collection of web pages containing text images audio and videos.
Answer: A website..?