Feiya has several computing devices around the home that are connected to the Internet:
A smart home assistant (connected via wireless)
A laptop computer (connected via wireless)
A desktop computer (connected via Ethernet)
Which of her devices use the Internet Protocol (IP) when sending data through the Internet?

Answers

Answer 1

Answer:

roaming

bluetooth

Explanation:

its right

Answer 2

The device that use the Internet Protocol (IP) when sending data through the Internet is every device she is using.

What is internet protocol?

The Internet Protocol (IP) is a protocol, or set of rules, that is used to route and address data packets so that they can travel across networks and arrive at their intended destination.

Data traveling across the Internet is split up into smaller slices known as packets.

Essentially, it enables linked gadgets to interact with one another despite differences in internal processes, structure, or design.

Network protocols enable easy communication with people all over the world and thus play an important role in modern digital communications.

The Internet can be accessed by a wide range of computing devices. To send data over the Internet, all devices must use the Internet Protocol.

Thus, all the given device will use the Internet Protocol (IP) when sending data through the Internet.

For more details regarding internet protocol, visit:

https://brainly.com/question/27581708

#SPJ2


Related Questions

Explain how data structures and algorithms
are useful to the use of computers in
data management (10 marks)


Explain how data structure and uses of computer in data management

Answers

Answer:

Data management is a important tool for data handling.

Explanation:

A good knowledge about the data stricture and data management is a prerequisite for working with codes and algorithms. It helps to identify the techniques for designing the algorithms and data storage in the system. It helps to find out the data hierarchy. Thereby allowing the data management in an efficient and effective way. It can increase the skills in computer programming

You are the IT administrator for a small corporate network. You have recently experienced some problems with devices on the workstation in the Support Office. In this lab, your task is use Device Manager to complete the following:______.
The new network card you installed isn't working as expected (speed is only 1 Mbps). Until you can figure out what the problem is, disable the Broadcom network adapter and enable the Realtek network adapter. To make sure the network adapter has the latest drivers, update the driver for the Realtek network adapter by searching Microsoft Update. You recently updated the driver for your video card. However, the system experiences periodic crashes that you suspect are caused by the new driver. Roll back the driver to a previous version. Move the Ethernet cable to the integrated network port on the motherboard.

Answers

Answer:

I will fix it by my mind by thinking

Based on the above scenario, the steps to take is given below\

What is the management about?

The first thing is to Right-click Start and click on Device Manager and then you expand Network adapters.

Later you Disable the network adapter  and then Update the driver .

Learn more about Ethernet from

https://brainly.com/question/1637942

#SPJ2

How many cost units are spent in the entire process of performing 40 consecutive append operations on an empty array which starts out at capacity 5, assuming that the array will grow by a constant 2 spaces each time a new item is added to an already full dynamic array

Answers

Answer:

Explanation:

260 cost units, Big O(n) complexity for a push

what are the services offered by web-based email?​

Answers

Answer:

Web based email is a service that allows to access and use electronic mail via web browser.

It allows clients to login into the email software running on a web server to compose, send and receive, delete mails basically.

Which is not a MARKETING impact of technology?

Social
Cultural
Economic
Environmental

Answers

Answer:

the answer is environmental

write a programmimg code in c++ for school based grading system, the program should accept the subject in the number of students from a user and store their details in the array of type student(class) the student class you have:
1. number student name, index number remarks as variables of type string, marks as integer and grade as char.
2. avoid function called getData which is used to get student details
3. avoid function called calculate which will work on the marks and give the corresponding great and remarks as given below on
Marks 70-100 grade A remarks excellent Mark 60-69 Grade B remarks very good marks 50-59 grade C remarks pass maths 0-49 grade F remarks fail​

Answers

Answer:

The program is as follows:

#include <iostream>

#include <string>

using namespace std;

class Student{

string studName, indexNo, remarks; int marks;  char grade;

public:

 void getData(){

     cin.ignore();

     cout<<"ID: "; getline(cin,indexNo);

  cout<<"Name:"; getline(cin,studName);

  cout<<"Marks: ";cin>>marks;  }

 void calculate(){

  if(marks>=70 && marks<=100){

      remarks ="Excellent";       grade = 'A';   }

  else if(marks>=60 && marks<=69){

      remarks ="Very Good";       grade = 'B';   }

  else if(marks>=50 && marks<=59){

      remarks ="Pass";       grade = 'D';   }

  else{

      remarks ="Fail";       grade = 'F';   }

  cout << "Grade : " << grade << endl;

  cout << "Remark : " << remarks << endl;  }

};

int main(){

int numStudents;

cout<<"Number of students: "; cin>>numStudents;

Student students[numStudents];

for( int i=0; i<numStudents; i++ ) {

 cout << "Student " << i + 1 << endl;

 students[i].getData();

 students[i].calculate(); }

return 0;}

Explanation:

This defines the student class

class Student{

This declares all variables

string studName, indexNo, remarks; int marks;  char grade;

This declares function getData()

public:

 void getData(){

     cin.ignore();

Prompt and get input for indexNo

     cout<<"ID: "; getline(cin,indexNo);

Prompt and get input for studName

  cout<<"Name:"; getline(cin,studName);

Prompt and get input for marks

  cout<<"Marks: ";cin>>marks;  }

This declares funcion calculate()

 void calculate(){

The following if conditions determine the remark and grade, respectively

  if(marks>=70 && marks<=100){

      remarks ="Excellent";       grade = 'A';   }

  else if(marks>=60 && marks<=69){

      remarks ="Very Good";       grade = 'B';   }

  else if(marks>=50 && marks<=59){

      remarks ="Pass";       grade = 'D';   }

  else{

      remarks ="Fail";       grade = 'F';   }

This prints the grade

  cout << "Grade : " << grade << endl;

This prints the remark

  cout << "Remark : " << remarks << endl;  }

};

The main begins here

int main(){

This declares number of students as integer

int numStudents;

Prompt and get input for number of students

cout<<"Number of students: "; cin>>numStudents;

This calls the student object to declare array students

Student students[numStudents];

This is repeated for all students

for( int i=0; i<numStudents; i++ ) {

Print number

 cout << "Student " << i + 1 << endl;

Call function to get data

 students[i].getData();

Call function to calculate

 students[i].calculate(); }

return 0;}

What is the definition of: a computer network? data communications? telecommunications? a local area network? a personal area network? a metropolitan area network a wide area network? network management? convergence? g

Answers

Answer:

The answer is below

Explanation:

1. Computer Network: this is a system of interconnection of computers and computing devices that utilizes wires or radio waves over certain reachable locations.

2. Telecommunications: this is known to be the system or combination of telephones device and networks that transmit telephone signals.

3. A local area network: often referred to as LAN, is a system of networks that covers a smaller area usually within a room, floor, building, or campus.

4. Personal area network: often referred to as PAN, this is a network that covers few distances, usually between wireless devices like PDAs, laptops, and other devices.

5. Metropolitan area network: often referred to as MAN, this is a system of the network that serves quite a larger area, usually between that serve an area of 1 to 30 miles radius. For example, a typical city.

6. Wide area network: often referred to as WAN, this is a system of a large network that covers a large area such as parts of states, many states, countries, and the world at large.

7. Network management: this is defined to be a process of designing, installing, and supporting a computer network, such as computer hardware and software

8. Convergence: this is known to be a connection, combination, and integration of two or more computer technologies in a single device or system for operation.

Give three reasons to use a hard drive as mass storage.

Answers

Answer:

Every computer – whether it's a tower desktop or laptop – is equipped with an internal hard drive. The hard drive is where all your permanent computer data is stored. Whenever you save a file, photo, or software to your computer, it's stored in your hard drive

Explanation:

Backups and Archives. ...

Media Libraries. ...

Large Capacity Storage. ...

NAS Drives and Security. ...

RAID Arrays. ...

Other Uses.

Help Pls
I need about 5 advantages of E-learning​

Answers

Answer:

Explanation:

E-learning saves time and money. With online learning, your learners can access content anywhere and anytime. ...

E-learning leads to better retention. ...

E-learning is consistent. ...

E-learning is scalable. ...

E-learning offers personalization.

Answer:

E- learning saves time and money

E-learning makes work easier and faster

E- learning is convenient

E- learning is consistent

E- learning is scalable

Explanation:

when you learn using the internet, you save a lot of time by just typing and not searching through books

what is programming language?​

Answers

Answer:

A programming language is a formal language comprising a set of strings that produce various kinds of machine code output. Programming languages are one kind of computer language, and are used in computer programming to implement algorithms. Most programming languages consist of instructions for computers

Answer:

The artificial languages that are used to develop computer programs are called programming language . hope this help!

Define a class named Payment that contains an instance variable of type double that stores the amount of the payment and appropriate get and set methods. Also, create a method named paymentDetails that outputs an English sentence to describe the payment amount. Next, define a class named CashPayment that is derived from Payment. This class should redefine the paymentDetails method to indicate that the payment is in cash. Include appropriate constructor(s). Define a class named CreditCardPayment that is derived from Payment. This class should contain instance variables for the name on the card, expiration date, and credit card number. Include appropriate constructor(s). Finally, redefine the paymentDetails method to include all credit card information. Define a class named PaymentTest class that contains the main() method that creates two CashPayment and two CreditCardPayment objects with different values and calls paymentDetails for each. (5 pts)

Answers

Answer:

The code is given below:

class Payment

{

private double amount;  

public Payment( )          

{

   amount = 0;

}

public Payment(double amount)

{

  this.amount = amount;

}

public void setPayment(double amount)

{

    this.amount = amount;

}

public double getPayment( )

{

   return amount;

 }

public void paymentDetails( )

{

   System.out.println("The payment amount is " + amount);

}

}

class CashPayment extends Payment

{

       public CashPayment( )

       {

             super( );

       }

      public CashPayment(double amt)

     {

      super(amt);

      }

     public void paymentDetails( )

    {

     System.out.println("The cash payment amount is "+ getPayment( ));

     }

}

class CreditCardPayment extends Payment

{

       private String name;

       private String expiration;

       private String creditcard;

       public CreditCardPayment()

      {

             super( );

            name = " ";

             expiration = " ";

              creditcard = "";

      }

       public CreditCardPayment(double amt, String name, String expiration, String creditcard)

      {

             super(amt);

             this.name = name;

             this.expiration = expiration;

             this.creditcard = creditcard;

      }

         public void paymentDetails( )

        {

           System.out.println("The credit card payment amount is " + getPayment( ));

           System.out.println("The name on the card is: " + name);

           System.out.println("The expiration date is: " + expiration);

           System.out.println("The credit card number is: " + creditcard);

      }

}

class Question1Payment

{

      public static void main(String[ ] args)

       {

         CashPayment cash1 = new CashPayment(50.5), cash2 = new CashPayment(20.45);

         CreditCardPayment credit1 = new CreditCardPayment(10.5, "Fred", "10/5/2010",

                                                                                                "123456789");

         CreditCardPayment credit2 = new CreditCardPayment(100, "Barney", "11/15/2009",

                                                                                                 "987654321");

         System.out.println("Cash 1 details:");

         cash1.paymentDetails( );

         System.out.println( );

         System.out.println("Cash 2 details:");

         cash2.paymentDetails( );

          System.out.println( );

         System.out.println("Credit 1 details:");

         credit1.paymentDetails( );

         System.out.println( );

         System.out.println("Credit 2 details:");

         credit2.paymentDetails( );

         System.out.println( );

       }

}

Output:

The Curiosity Rover has recently landed on Mars and likes to send Twitter updates on its progress. If a tweet is posted 10 minutes after it was sent, how far is Curiosity from Earth? (Assume there is no network lag.)

Answers

Answer:

1.8 * 10^11 m

Explanation:

Given that :

Time taken for tweet to me posted after been sent, t = 10 minutes

t in seconds :

60 seconds = 1 minute

10 minutes = (10 * 60) = 600 seconds

Tweet sent will br transmitted at the speed of light, c = 3 * 10^8 m/s

Recall :

Speed = distance / time

Distance = speed * time

Distance of Curiosity from Earth = (3 * 10^8 * 600)

Distance of curiosity from earth = 1.8 * 10^11 m

what is the build in libary function to compare two strings?​

Answers

Answer:

strcmp() is a built-in library function and is declared in <string. h> header file. This function takes two strings as arguments and compare these two strings lexicographically.

Explanation:

Hope it helps

Which Windows installation method requires the use of Windows deployment services (WDS)?
1. Network Installation
2. Repair Installation
3. Bootable flash drive installation
4. Unattended installation​

Answers

Answer:

1. Network Installation

Explanation:

Given

Options (1) to (4)

Required

Which requires WDS for installation

WDS are used for remote installations where users do not have to be physically present before installations can be done; in other words, it is necessary for network based installations.

Of all the given options, (a) is correct because without WDS, network installation cannot be done.

Which option is used in order to configure switchboards for a complex database?
Switchboard Manager
Global Options
Quick Search
Database Formatter
worth 100 points

Answers

Answer:

switch board manager

Explanation:

In the home tab under the paragraph group of options what are you unable to do?

Answers

Im not sure what this is?? Maybe add a picture or more context! ❤️

In a file called amortizedAnalysis.pdf, please provide answers to the following questions: How many cost units are spent in the entire process of performing 40 consecutive append operations on an empty array which starts out at capacity 5, assuming that the array will double in capacity each time a new item is added to an already full dynamic array

Answers

Answer:

a

Explanation:

sdfghj

A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also be system objects such as shared memory or a linked list data structure. This principle is based in object-oriented programming (OOP). In OOP, a class definition encapsulates all data and functions to operate on the data. The only way to access a resource is through the provided interface. Which security principle are we referring to

Answers

Answer:

The security principle being referred to here is:

Resource Encapsulation.

Explanation:

Resource Encapsulation is one of the cybersecurity first principles.  It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity.  Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.

An integer is said to be a perfect number if the sum of its divisors, including 1 (but not the number itself), is equal to the number.

a. True
b. False

Answers

true

explanation: bc it is

2.
The force of impact is

Answers

Answer:

lực ( Tiếng Anh : force ) là bất kỳ ảnh hưởng nào làm một vật thể chịu sự thay đổi, hoặc là ảnh hưởng đến chuyển động, hướng của nó hay cấu trúc hình học của nó.

Explanation:

d. Which of the following computer has complex system? i. Hybrid computer ii. IBM computer iii. Mainframe computer iv. Analog computer​

Answers

Answer:

Hybrid computer has complex system

Uses of a computer load speaker

Answers

Answer:

A computer speaker is an output hardware device that connects to a computer to generate sound. The signal used to produce the sound that comes from a computer speaker is created by the computer's sound card.

I hope this will help you if not then sorry have a great day :)

The Federal Financial Institutions Examination Council (FFIEC) developed the Cybersecurity Assessment Tool, which can be used as a self-assessment tool for identifying a bank or financial institution's cybersecurity maturity.
a. True
b. False

Answers

Answer:

a. True

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

The Federal Financial Institutions Examination Council (FFIEC) is an interagency of government that was established on the 10th of March, 1979. FFIEC is saddled with the responsibility of developing the Cybersecurity Assessment Tool, which is then used as a self-assessment tool for identifying the maturity of a bank's or financial institution's cybersecurity.

cpp Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, which indicates a threshold. Output all integers less than or equal to that last threshold value. Ex: If the input is:

Answers

Answer:

#include <iostream>

int main() {

 // The length of the list

 int l;

 // The array containing the numbers

 int *list;

 // Threshold, last value in array

 int thresh;

 

 // Read in first value and create an array with the size of that value

 scanf("%d", &l);

 list = (int*) malloc(l * sizeof(int));

 

 for(int i = 0; i < l; i++) {

   scanf("%d", &list[i]);

 }

 thresh = list[l - 1];

 // Print the values

 for(int i = 0; i < l - 1; i++) {

   if (list[i] <= thresh) {

     printf("%d ", list[i]);

   }

 }

 

 printf("\n");

 free(list);

}

Explanation:

The program assumes at least two values are provided. The length of the list and the threshold.

We first read in an integer, and find out how many more integers we need to read. We create an array with the appropriate size, and loop through to fill the array with values. We know the last value is the threshold, and so we do one more loop to compare the values in the array with the threshold.

Please draw the dynamic array stack structure (you must mention the size and capacity at each step) after the following lines of code are executed. You should assume that the initial capacity is 2 and a resize doubles the capacity.

values = Stack()
for i in range( 16 ) :
if i % 3 == 0 :
values.push( i )
else if i % 4 == 0 :
values.pop()

Answers

Answer:

Explanation:

dxfcgvhb

transmits data wirelessly via infrared (IR) light waves.
As
O A. RFID
B. Ethernet
O C. Bluetooth
D. IrDA
Reset Selection

Answers

Answer is
C - Bluetooth ( wireless via infrared )

Write a Racket two-way selection structure that will produce a list '(1 2 3) when the first element of a list named a_lst is identical to the atom 'a and an empty list otherwise. Note that you are NOT required to write a function definition!

Answers

Answer:

A

Explanation:

a. Download the attached �Greetings.java� file.
b. Implement the �getGreetings� method, so that the code prompts the user to enter the first name, the last name, and year of birth, then it returns a greetings message in proper format (see the example below). The �main� method will then print it out. Here is an example dialogue with the user:
Please enter your first name: tom
Please enter your last name: cruise
Please enter your year of birth: 1962
Greetings, T. Cruise! You are about 50 years old.
Note that the greetings message need to be in the exact format as shown above (for example, use the initial of the first name and the first letter of the last name with capitalization).
c. Submit the final �Greetings.java� file (DO NOT change the file name) online.

Answers

Answer:

Code:

import java.util.*;  

public class Greetings  

{  

   public static void main(String[] args)  

   {        

       Scanner s = new Scanner(System.in);  

       System.out.println(getGreetings(s));  

   }  

   private static String getGreetings(Scanner console)  

   {          

   System.out.print("Please enter your first name: ");  

   String firstName=console.next();    

   char firstChar=firstName.toUpperCase().charAt(0);  

   System.out.print("Please enter your last name: ");  

   String lastName=console.next();    

   lastName=lastName.toUpperCase().charAt(0)+lastName.substring(1, lastName.length());  

   System.out.print("Please enter your year of birth: ");  

   int year=console.nextInt();  

   int age=getCurrentYear()-year;  

   return "Greetings, "+firstChar+". "+lastName+"! You are about "+age+" years old.";  

   }  

   private static int getCurrentYear()  

   {  

       return Calendar.getInstance().get(Calendar.YEAR);  

   }  

}

Output:-

Programming languages categorize data into different types. Identify the characteristics that match each of the following data types.

a. Can store fractions and numbers with decimal positions
b. Is limited to values that are either true or false (represented internally as one and zero).
c. Is limited to whole numbers (counting numbers 1, 2, 3, ...)

Answers

Answer:

a) Integer data type.

b) Real data type.

c) Boolean data type.

Explanation:

a) Integer data type is limited to whole numbers (counting numbers 1, 2, 3…….).

b) Real data type can store fractions and numbers with decimal positions (such as dollar values like $10.95).

c) Boolean data type is limited to values that are either true or false (represented internally as 1 and 0 respectively).

g Add a throw statement to the processNumbers function that throws the message "An element in the list is not a number." if one of the elements in toProcess is not a number. Hint: The function isNaN() returns true if the parameter is not a number.

Answers

Answer and Explanation:

function processNumbers(alist){

var Ourarray= new array(alist);

Ourarray.foreach(

if(isNaN()){

Console.log( "An element in the list is not a number."};

break;

}

}

processNumbers(alist)

From the above, we have defined a function that takes an array parameter(the following array variable will make sure of that). We test each element in the array using foreach array function. The for each function runs the if statement and if isNan is true for each of the elements in the array.

Other Questions
What are the strongest three arguments that go against Kaepernicks decision to kneel during the national anthem? Algebra two divide plz help (SAT PREP) Find the value of x in each of the following excersises During Year 1, Hardy Merchandising Company purchased $20,000 of inventory on account. Hardy sold inventory on account that cost $15,000 for $22,500. Cash payments on accounts payable were $12,500. There was $20,000 cash collected from accounts receivable. Hardy also paid $4,000 cash for operating expenses. Assume that Hardy started the accounting period with $18,000 in both cash and common stock.Required:a. Record the events in a horizontal statement model.b. What is the balance of accounts recelvable at the end of 2018?c. What is the balance of accounts payable at the end of 2018? d. What are the amounts of gross margin and net income for 2018? A buyers agent represents the buyer, and the sellers agent represents the broker true or false? Galaxy Air, previously a no-growth firm, has two million shares outstanding. Until now, it consistently earned $20 million per year on its assets. (It has no debt and pays out all earnings as dividends. Its cost of capital is 10 percent.) Due to its newly appointed CEO, Galaxy Air is now able to squeeze out 1 percent annual growth by plowing back 5 percent of earnings. Calculate its stock price per share find an odd natural numbers x such that LCM (x, 40) = 1400 What table represents a linear function A 2-stage dcv that has an internal pilot does not work well (if at all) on Conservatives believe that, when the government regulates theeconomy, it makes the economy *A.stronger.B.less efficientC.stable.D.friendlier to the poor. If Texia specializes in food, it can produce 1,000 units of food and 0 units of clothing this year. If it specializes in clothing, it can produce 500 units of clothing and 0 units of food. This year Urbania can produce either 500 units of food and 0 units of clothing or 200 units of clothing and 0 units of food. (assume linear production possibility frontiers) _______has the absolute advantage in the production of clothing and ________has the absolute advantage in the production of food. Texia; Texia Texia; Urbania Urbania; Texia Urbania; Urbania In the short run, open-market purchases a. increase investment and real GDP, and decrease interest rates. b. increase real GDP and interest rates, and decrease investment. c. increase investment and interest rates, and decrease real GDP. d. decrease investment, interest rates, and real GDP. Don't suggest that I am antidemocratic or somehow un-American. I'm a true patriotwho believes that the best public policy is a product of what the ____________ of American citizens prefer.a. best educatedb. majorityc. minority Dharti Ka badhta tapman anuchchhed lekhan What is a counterclaim to the claim "banned books can teach people"? 1. Use the following notes to write into full sentences about St Paul's Cathedral in London.a. On/left/beautiful/St Paul's Cathedral.b. Stood/over 300 years.c. Designed/Christopher Wren.d. One/large/dome/world.e. Said/influenced/design/Capitol building/Washington.f. Lord Nelson/buried/crypt. can someone make a slogan for a fitness company? it only has to be, like, one sentence. I need to think of one but I'm having a hard time thinking of one lol. Catriona spotted a major problem having to do with patient billing. A number of people may have received the wrong bills. When should she have told her boss? O a) When she was evaluating how to alert the patients O b) After she sent patient notices out c) When she first noticed the problem O d) After she decided on a communication plan HURRY PLEASEIn the play The Tempest by William Shakespeare, the tale begins with one of the main characters being cast away on an island after a violent storm at sea. Which type of conflict does this show?Man vs. ManO Man vs. NatureO Man vs. SelfO Man vs. Society Compare Ernest Thayer's "Casey at the bat" to a typical prose story. What differences and similarities do you notice in the development of the plot?How does the pacing of the story in the poem change before and while Casey is at the plate?