tls provides security at the layer. a. network b. transport c. application d. none of the above

Answers

Answer 1

TLS offers security at the transport layer.

What is TLS?

A cryptographic technique called Transport Layer Security (TLS) is intended to guarantee communications security over a computer network. Although the protocol is widely used in voice over IP, email, and instant messaging, its use to secure HTTPS is still the most commonly known.

Through the use of cryptography, such as the usage of certificates, the TLS protocol primarily attempts to offer security, including privacy (confidentiality), integrity, and authenticity between two or more communicating computer programs.

The TLS record and the TLS handshake protocols make up its own two layers, which it executes in the presentation layer.

A communications protocol that offers security to datagram-based applications is the closely related Datagram Transport Layer Security (DTLS).

Hence, TLS offers security at the transport layer.

To learn more about Transport Layer Security refer to:

https://brainly.com/question/29556400

#SPJ4


Related Questions

Ashanti is using the PC version of Word, and she wants to create an interactive table of contents—pages that, when the user clicks on them, will take the user to that section of her document. Describe the exact process by which Ashanti could accomplish this task.

Answers

Answer:

Using some sort of link or hyperlink connected to the text would be a great way to do this, just highlight the text with your cursor and right click and click on hyperlink then set it up to go to the designated page.

Absolutely Brilliant if you to ask me!  

Question 531.5 pts
Respondents will have interactions with a human interviewer when
participating in a computer assisted telephone (CATI) survey.
Group of answer choices
True
False
Flag question: Ques

Answers

True. Computer assisted telephone (CATI) survey is a technique of data collection where human respondents.

Computer assisted telephone (CATI) survey is a technique of data collection where human respondents are interviewed over telephone by a computerized questionnaire with the assistance of a human interviewer. The CATI method has been in existence for several years and it has been a widely used method of data collection. Respondents will have interactions with a human interviewer when participating in a computer assisted telephone (CATI) survey.
In CATI survey, the interviewer interacts with the respondent by reading the questions from a computer screen and records the answers directly into a computer system. CATI survey is useful because it has the ability to collect accurate data in a short time, which makes it an effective method for collecting data.

Learn more about data :

https://brainly.com/question/31680501

#SPJ11

What is wrong with each of the following code segments? int[] values; for (int i = 0; i < values.length; i++) { values[i] = i * i; }

Answers

Answer:

values have been declared but not initialized nor allocated memory. So you are not allowed to use "values.length"

Write down the output of the given program. Show with dry run in table.

DECLARE SUB SHOW (A)
CLS
N= 87
CALL SHOW (N)
END
SUB SHOW (A)
DO
B = A MOD6 + 3
IF B MOD 4 = 0 THEN GOTO AA
PRINT B;
AA:
A=A-10
LOOP WHILE A>=50
END SUB​

Answers

Based on the given input: the dry run in table is given below:

DECLARE SUB SHOW (A)

CLS

N= 87

CALL SHOW (N)

END

SUB SHOW (A)

DO

B = A MOD6 + 3

IF B MOD 4 = 0 THEN GOTO AA

PRINT B;

AA:

A=A-10

LOOP WHILE A>=50

END SUB​

Dry Run: N=87

A= 87

B= A MOD 6 + 3 B MOD 4=0? PRINT B; A=A-10 A>=50?

B=87 MOD 6 + 3

=3+3=6 6 MOD 4 =0? (NO) 6 A=87-10=77 77>=50? Y

B=77 MOD 6 + 3

=5+3=8 8 MOD 4=0? YES – A=77-10=67 67>=50? Y

B=67 MOD 6

=1+3=4 4 MOD 4=0? YES – A=67-10=57 57>=50? Y

B=57 MOD 6

= 3+3=6 6 MOD 4=0? NO 6 A=57-10=47 47>=50? NO

Read more about qbasic here:

https://brainly.com/question/20727977

#SPJ1

HELPPP! What kinds of data sources might a student use for academic purposes?

****Check all that apply*****

•keyboards
•online periodicals
•databases
•Internet
•library books

Answers

Answer:

The correct answers are all of them, instead of A.

Explanation:

B.) online periodicalsC.) databasesD.) InternetE.) library books

Data source is defined as the term given for a connection established from a server to a database. When writing queries to a database, the name is often used. So, all options are correct except A.

What is Data Sourcing?

Data sourcing is defined as the process through which companies collect and integrate information from multiple internal and external sources, where this technique establishes the firm's data infrastructure, which is used to manage daily workflows and perform various tasks which is used to achieve business goals.

Data sourcing is an important aspect of modern business because it allows companies to obtain the information assets they need. There are two types of data sources: machine data sources and file data sources where both contain the same information about the source of the data, they differ in the way this information is stored.

Thus, Data source is defined as the term given for a connection established from a server to a database. When writing queries to a database, the name is often used. So, all options are correct except A.

Learn more about Data sourcing, here:

brainly.com/question/2053985

#SPJ2

what is the term for sending emails that imitate legitimate companies?

Answers

Answer:

phishing,,,, it imitates the company email so that when you get on the mail it can collect all your data and then can begin to hack using your information such as password

Phishing refers to the malicious attack method by attackers who imitate legitimate companies in sending emails in order to entice people to share their passwords, credit card or other sensitive personal information. ... If you do surrender such information, the attacker will immediately capture your personal information.

Which HIT application can connect providers to patients in a geographically diverse area? 1) Telemedicine. O 2 CPA 3) EHRS. 4) None of these

Answers

the answer is
number 3

Write pseudocode for a function called swapLarge. This function has an input 3 integers: x, y, and z. The algorithm will swap the values of two of these variables. Specifically, it will swap the largest value and the second largest value. For example, if x = 1, y = 2, and z = 3, then the output would be x = 1, y = 3, and z = 2.

Answers

The pseudocode for the "swapLarge" function, which swaps the largest value and the second largest value among three input integers (x, y, and z), is as follows:

```

function swapLarge(x, y, z):

   if x > y and x > z:

       if y > z:

           temp = y

           y = x

           x = temp

       else:

           temp = z

           z = x

           x = temp

   else if y > x and y > z:

       if x > z:

           temp = x

           x = y

           y = temp

       else:

           temp = z

           z = y

           y = temp

   else:

       if x > y:

           temp = x

           x = z

           z = temp

       else:

           temp = y

           y = z

           z = temp

   return x, y, z

```

In this pseudocode, the function checks for the largest value among the input variables and performs swaps accordingly. The variables x, y, and z are updated within the function, and the final values are returned as the output.

Learn more about sorting algorithms here:

https://brainly.com/question/13152286

#SPJ11

Generalized goals are more likely to be achieved than specific goals. True or False

Answers

False

They are likely to be achieved because they are well defined, clear, and unambiguous.

Select the correct answer.
Linda is making handouts for her upcoming presentation. She wants the handouts to be comprehensible to people who do not attend her
presentation. Which practice should Linda follow to achieve this goal?
OA.
OB.
OC.
OD.
provide a summary of the presentation
make the handouts more image-oriented
speak in detail about each topic
provide onlya printout of the slideshow


Can someone please help me with this class b4 I lose my mind
Amos: xoxo_11n

Answers

Answer:

OA

Explanation:

I took this quiz

The CPU is often called the
of the computer.

Answers

Answer:

Explanation:

Tower?

Answer:

Its often called the brains of a computer.

Explanation:

in tuesday’s episode, we featured a report on what type of technology that has some people worried will take their jobs?

Answers

The technology that has some people worried about job displacement is artificial intelligence (AI) and automation.

AI is the ability of machines to learn and perform tasks that typically require human intelligence, such as decision-making, problem-solving, and language understanding. Automation is the use of machines to perform tasks that are typically done by humans, such as manufacturing, data entry, and customer service. As these technologies become more advanced, there is a concern that they will replace jobs that are currently done by humans, leading to unemployment and economic disruption. Some industries that are particularly vulnerable to job displacement include transportation, manufacturing, and customer service. However, others argue that AI and automation will create new jobs and improve productivity, leading to a net positive effect on the economy.

To know more about Artificial intelligence visit:

https://brainly.com/question/23824028

#SPJ1

HELP ASAP PLEASE!!!

HELP ASAP PLEASE!!!

Answers

Answer:

Click and drag the mouse to select the cells

Explanation:

You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

Answers

The virtual disk configuration for the VMs on both servers in this environment is shown below.

In the Hyper V Test,

Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,

What is virtual disks?

Setting up 5 virtual disks, each 50 GB in size.

2 VMs each have a 50 GB virtual drive assigned to them.

The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.

To learn more about virtual disks refer to:

https://brainly.com/question/28851994

#SPJ1

Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.

What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.

Therefore,

Configuration:

Creating 5 Virtual disks of 50 GB each.

1 virtual disk of 50 GB is assigned to 2 VM.

The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.

For Hyper V App,

Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.

Configuration:

Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.

Since only two VMs are run here, the disk space can be separated.

To learn more about Hyper V Test, refer to:

https://brainly.com/question/14005847

#SPJ1

what is the name of the statement used for providing calculations in pseudocode​

Answers

Answer:

processing statement

Explanation:

processing statement is used to perform calculation or assignment.

Say you wanted to make a computer game from a board game that you are playing. Think about what objects are in the game. For example, here is the description for Monopoly (trademark Hasbro games): "Buy, sell, dream and scheme your way to riches. Players buy, sell and trade to win. Build houses and hotels on your properties and bankrupt your opponents to win it all. Chance and Community Chest cards can change everything. " What classes would you need to create a computer version of this game? (Remember to look for the nouns). Take one of the classes you listed, and try to come up with 2 pieces of data in that class that will be the instance variables

Answers

Answer:

Some potential classes that could be used to create a computer version of Monopoly might include:

Board: This class could represent the overall game board and keep track of the various properties, streets, and other spaces on the board.

Player: This class could represent a player in the game and keep track of their current position on the board, their cash and assets, and any properties they own.

Property: This class could represent a property on the board, such as a street or rail road. It could keep track of the property's name, price, and any buildings or improvements that have been built on it.

Card: This class could represent a card from the Chance or Community Chest decks. It could keep track of the card's name and instructions for what the player should do when they draw the card.

As an example, here are two pieces of data that could be instance variables in the Property class:

name: This variable could store the name of the property, such as "Boardwalk" or "Park Place".

price: This variable could store the price of the property, which could be used to determine how much it costs to buy the property or how much rent a player must pay when they land on it.

Explanation:

We may require a variety of classes. We can list a few of them here: Dice class: used to generate random steps by rolling dice.

What is class?

A class is a template specification of the method(s) and variable(s) of a certain kind of object in object-oriented programming.

As a result, an object is a particular instance of a class; instead of variables, it holds real values.

A class is an object's "blueprint," describing or displaying all the features and information that an item of a given class offers.

We might need a range of courses. Here are a few examples of them: Rolling dice is used in the dice class to produce random steps.

A player's assets, debts, moves, and money will all be stored in this class, along with other information.

Thus, this way, classes would you need to create a computer version of this game.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

Why error occurs during transmission? Explain different types of errors with suitable examples. 5 (b) How do you detect error using CRC? Generate the CRC code for the data word 1101011011 The divisor is x4+x+1. 7

Answers

During transmission, errors occur due to a variety of factors such as atmospheric conditions, system malfunction, or network errors.

Different types of errors include Single Bit Error, Burst Error, and Burst Error Correction. Here are the different types of errors with suitable examples: Single Bit Error: It occurs when one bit of data is changed from 1 to 0 or from 0 to 1 in data transfer. This type of error is mainly caused by a small amount of interference or noise in the transmission medium. For instance, a parity bit error.Burst Error: It occurs when two or more bits are incorrect during data transmission. A Burst Error occurs when bits of data are lost or changed in groups, which can affect multiple data bits at once. It can be caused by signal loss or attenuation in fiber-optic cables. Burst Error Correction: To overcome the issue of Burst Error, Burst Error Correction is used. This method divides data into blocks to detect and fix errors. Reed-Solomon coding and Viterbi decoding are two types of burst error correction techniques. There are different techniques for error detection, and the Cyclic Redundancy Check (CRC) is one of them. CRC checks the checksum at the receiver's end to ensure that the data was not corrupted during transmission. To detect errors using CRC, follow these steps: Divide the data word by the generator polynomial. Generator polynomial: x4 + x + 1 Divide 1101011011 by x4 + x + 1 and find the remainder by using the modulo 2 division method.1101011011 10011- 10011000- 10011000- 10010100- 10010100- 10000001- 10000001- 1111100- 1111100- 1001The remainder of the above step is the CRC code of the data word, which is 1001. Therefore, the CRC code for the data word 1101011011 is 1001.

know more about type of error.

https://brainly.com/question/31751999

#SPJ11

Maxim and his friends like to play on their phones during school lunch. When Souta tries to sit with them, they yell and call him names.

PPPLLLLLSSSS HHHEEEELLLLPPP MEEEEEE BRAINLIEST WILL BE GIVEN Which explains the behavior of Maxim and his friends?

This is a form of traditional stalking despite the use of technology.
This is a form of cyber stalking because it involves using technology to harass.
This is a form of cyberbullying because using the phones involves technology.
This is a form of traditional bullying despite the use of technology.

Answers

Last answer “This is a form of traditional bullying despite the use of technology”

Answer:  This is a form of traditional bullying despite the use of technology

What is the connection between self-concept and communication?

Answers

The study of interpersonal communication focuses on communication between two persons in close relationships (NCA, nod). Each of us must first establish personal communication.

What is self-concept?The idea that a person has about themselves, including their characteristics and notions of who they are as a person. In his book on the subject from 1979, Rosenberg provided a similar definition of self-concept as "the entirety of an individual's thoughts and feelings bearing reference to himself as an object."Self-concept is how we view our actions, skills, and distinctive qualities. 1 Examples of beliefs that make up a person's general self-concept include "I am a nice friend" and "I am a compassionate person." We separate the four key conceptual building blocks that make up the diverse self-presentational selves. These include the ideal self, the actual or behavioral self, the public self, and the self-concept.

To learn more about self-concept refer to:

https://brainly.com/question/13468917

#SPJ4

If you spend time on social media, you probably see many infographics. How can you determine whether the information contained in them is trustworthy? When you create infographics, what can you do to make it more likely that the viewer will trust you?

Answers

Answer:

Provide sources.

Explanation:

Providing sources for your infographic would be the best I can think of.

Either a direct quote, a source for a graph, etc.

with the ________ delivery model, cloud computing vendors provide software that is specific to their customers’ requirements.

Answers

Cloud Computing  is simply known to be a type of computing. Software-as-a-Service (SaaS) delivery model, cloud computing vendors provide software that is specific to their customers’ requirements.

Software-as-a-Service (SaaS) is simply define as a type of cloud computing vendors that gives software that is particular to their customers' needs.

It is the most used  service model as it gives a broad range of software applications. It also gives web-based services to its user.

Learn more from

https://brainly.com/question/14290655

Which of the following is an example of a technical ("hard") skill?.

Answers

Answer: Microsoft Office, Troubleshooting, Interpreting Data, Video Editing, Graphic Design

Explanation:

what is protected vs unprotected draft pick?

Answers

Draft picks that are not protected have no limitations on the team that possesses them. The ownership team may select the player of their choice regardless of where that pick is placed in the draught.

What distinguishes protected picks from unprotected picks?

A protected pick is one that a team would hold onto from the first through the tenth picks in the draught. An unprotected pick is one that the team must forfeit under any circumstances; it could be an unfavourable selection in the draught or even a player who is already on their squad.

What does an NBA unprotected draught pick mean?

In the most recent deal involving Paul George and the Los Angeles Clippers, for instance, the Oklahoma City Thunder acquired four first-round selections in the unprotected draught from the the future. This means that the Thunder will receive the Clippers pick no matter what overall it is. If the Clippers get number 1 overall, the Thunder will receive it.

To know more about protected visit:-

https://brainly.com/question/30457171

#SPJ4

which of the following would be the best opening sentence for a solicited application letter?

Answers

"Dear [Hiring Manager's Name], I am writing to apply for the [position] advertised on [job posting source]."

How can I start a solicited application letter effectively?

When writing a solicited application letter, it is crucial to start with a strong opening sentence that immediately grabs the attention of the hiring manager. The suggested opening sentence, "Dear [Hiring Manager's Name], I am writing to apply for the [position] advertised on [job posting source]," is effective for several reasons:

Personalization: Addressing the letter directly to the hiring manager shows that you have taken the time to research and identify the appropriate person to contact. It adds a personalized touch and demonstrates your attention to detail.Clarity of purpose: By stating that you are writing to apply for a specific position, you convey your intention clearly right from the beginning. The hiring manager can immediately understand the purpose of your letter.

Mentioning the job posting source: Including the source where you found the job posting indicates that you have actively sought out the opportunity and are familiar with the company's recruitment channels. It shows your genuine interest in the position. Overall, this opening sentence sets a professional tone and provides essential information upfront. It allows the hiring manager to quickly understand the purpose of your letter and makes a positive impression by showcasing your attention to detail and genuine interest in the position.

Learn more about solicited application

brainly.com/question/29803067

#SPJ11

O cannot open app package publisher: microsoft corporation version: 1. 18. 2691. 0 his app package is not supported for installation by app installer because it uses certain restricted capabilities. X

Answers

Execute the troubleshooter: Press the Start button, choose Settings > Update & Security > Troubleshoot, choose Windows Store apps from the list, and then press Run the troubleshooter.

How can I activate the Microsoft App Installer protocol?

Once the Desktop App Installer policy has been downloaded, open the Local Group Policy Editor and go to Computer Configuration > Administrative Templates > Windows Components > Desktop App Installer. Then, select "Enable App Installer ms-appinstaller protocol." to activate the functionality.

How can a Microsoft app be fixed?

Choose the app you wish to update. The Advanced options link will be under the app's name; some apps won't have this option. If Repair is an option on the new page, choose it. Choose Reset if it's unavailable or doesn't resolve the issue.

To know more about troubleshooter visit :-

https://brainly.com/question/30048504

#SPJ4

Explain the emerging trends in microcomputer technology in relation to size

Answers

Microcomputers, also known as personal computers, have come a long way since their inception in the 1970s. The emerging trends in microcomputer technology have been primarily focused on reducing the size of the devices while still maintaining their computing power. These trends have been driven by the need for portability, convenience, and efficiency.


One of the emerging trends in microcomputer technology is the development of smaller and thinner devices. Manufacturers are working towards creating devices that are not only portable but also lightweight.

This trend has been made possible by the advancements in miniaturization of computer components such as processors, storage devices, and batteries.

Another trend is the development of flexible and foldable displays that can be used in microcomputers. These displays are lightweight, thin, and durable, making them ideal for portable devices.

The use of flexible displays has allowed for the development of foldable laptops, tablets, and even smartphones. The emergence of Artificial Intelligence (AI) and Machine Learning (ML) has also had an impact on microcomputer technology.

Many microcomputers now come equipped with AI and ML capabilities, enabling them to process data faster and more efficiently.

This has led to the development of devices that can analyze and learn from data, which has many applications in industries such as healthcare, finance, and retail.

The trend towards reducing the size of microcomputers has also led to the development of wearable technology such as smartwatches and fitness trackers.

These devices are small, lightweight, and can be worn on the body, making them convenient for users who need to monitor their health or track their fitness.

In conclusion, the emerging trends in microcomputer technology are focused on reducing the size of devices while still maintaining their computing power. These trends are driven by the need for portability, convenience, and efficiency.

Manufacturers are working towards creating devices that are smaller, thinner, and more flexible. The use of AI and ML capabilities has also contributed to the development of more efficient devices.

The future of microcomputer technology is exciting, and we can expect to see even more advancements in the coming years.

For more questionon "Microcomputer Technology" :

https://brainly.com/question/30610552

#SPJ11

Sally is an online retailer who engages in third-party network transactions via nettrans, inc. payment company to facilitate financial transactions in the sale of her products. for 2022, what is the minimum aggregate sales and number of sales per year required to trigger a 1099-k by nettrans, inc. payment company?

Answers

Answer:

Under the Internal Revenue Service (IRS) rules, a payment settlement entity (such as Nettrans, Inc.) is required to file a Form 1099-K with the IRS and furnish a copy to the relevant payee if it processes more than 200 transactions with a payee and the payee receives gross payments of more than $20,000 in a calendar year. This means that if Sally receives more than $20,000 in gross payments through Nettrans, Inc. in a calendar year, and Nettrans, Inc. processes more than 200 transactions with Sally in that year, Nettrans, Inc. will be required to file a Form 1099-K with the IRS and furnish a copy to Sally.

It's important to note that this requirement applies to the gross payments Sally receives, not the net amount she receives after deducting any fees or other expenses. Additionally, it's worth noting that this requirement applies to all payees who receive gross payments through Nettrans, Inc., not just online retailers like Sally.

If Sally has any questions about the Form 1099-K or her tax obligations, she should consult with a tax professional or refer to IRS guidance.

Explanation:

Sally should speak with a tax expert or review the IRS guidelines if she has any concerns regarding the Form 1099-K or her tax responsibilities.

What is third-party network transaction?

Any transaction that is resolved through a third-party payment network is referred to as a third-party network transaction, but only if the aggregate value of all such transactions surpasses minimal reporting limits.

According to Internal Revenue Service regulations, if a payment settlement organization performs more than 200 transactions with a payee and the payee gets gross payments of more than $20,000 in a calendar year.

It must file Form 1099-K with the IRS and provide a copy to the relevant payee. This implies that Nettrans, Inc. will be required to file a Form 1099-K with the IRS and provide a copy to Sally.

If Sally gets more than $20,000 in gross payments through Nettrans, Inc. in a calendar year and Nettrans, Inc. performs more than 200 transactions with Sally in that year.

Thus, this can be the solution for Sally for the given scenario.

For more details regarding third-party network transactions, visit:

https://brainly.com/question/29646130

#SPJ2

What are the popular avenues for publishing a Web site once it has been built? a. online services, software tools, and plain text editors b. ASP.NET, Dreamweaver, and JavaServer Pages c. ISPs, free sites, and Web hosting services d. Nvu, Adobe ColdFusion, and Rapid Weaver

Answers

The popular avenues for publishing a website once it has been built are ISPs (Internet Service Providers), free sites, and web hosting services.

What is an ISP?

An ISP offers web hosting services in addition to connecting consumers to the internet. As the name implies, free websites let users host their websites on a free subdomain that the website provides. In addition to other services like email accounts and domain name registration, web hosting providers give customers server space on which to host their websites.

Websites can be built using online services, software tools, and plain text editors, but they cannot be published using these methods. Although there are specialised channels for publishing a website, tools and platforms for constructing websites like ASP.NET, Dreamweaver, JavaServer Pages, Nvu, Adobe ColdFusion, and Rapid Weaver do exist.

Learn more about Web here:

https://brainly.com/question/17512897

#SPJ1

about how many smart devices are active today coinbase

Answers

Considering the latest information released by Statisticà, the number of active smart devices in the world today is 21.5 billion.

What is Smart Device?

Smart Device are generally known as electronic devices, that have the capacity to connect with other device or networks through wireless servers like Bluetooth, Zigbée, NFC, Wi-Fi, LiFi, 5G, etc.

Examples of Smart Devices

Smart devices generally include the following:

SmartphonesSmart cars Smart doorbellsSmart refrigeratorsTabletsPCSmart watches, etc.

Hence, in this case, it is concluded that the correct answer is 21.5 billion.

Learn more about Smart Device here: https://brainly.com/question/24803254

Which one bc im struggling

Which one bc im struggling

Answers

Answer:

cant really see it

Explanation:

Other Questions
what is 0.33 as a fraction and percent Please help! The question is above^(Ignore the one already selected, it may not even be the right one) How many different triangles are there in thisimage? Kim wants to buy art supplies that normally costs $50, but are on sale for 20% off. What is the sale price for the art supplies? Ixl HELP pLease get this done quick Triangle ABC has side lengths of a = 16, b equals 16 times radical 3 comma and c = 32 inches. Part A: Determine the measure of angle A period (5 points) Part B: Show how to use the unit circle to find tan A. (2 points) Part C: Calculate the area of ABC. (3 points) native american culture was extremely diverse, but many shared certain commonalities. this was especially true when compared to those european societies with whom they would later make contact. all the following statements are generally true about indigenous community structures except. question 1 options: a) most indigenous communities are patrilineal. b) most indigenous communities are matrilineal. c) women in indigenous communities typically have a great deal of power. d) kinship networks are a primary social bond in many indigenous communities. differences between low-mass and high-mass stars include the fact that high-mass stars . (select all that apply.) A multiplier of 0.75 represents which percentage decrease ? Read It!When British environmentalist Roz Savage arrived in Papua New Guinea, on June 4, 2010, she was greeted like arock star. Thousands of people turned out to welcome her. And for good reason: Savage had just become the firstwoman to row alone across the Pacific Ocean. Savage estimates that she made 2.5 million oar strokes during herjourney. The trip was broken up into three different legs. First, she set off from San Francisco on May 25, 2008,and rowed 2,900 miles (4,667 kilometers) to Hawaii. Then, on May 22, 2009, Savage left Hawaii and rowed 3,158miles (5,082 kilometers). She reached the tiny South Pacific nation of Kiribati in September 2009. For the last leg,she left Kiribati on April 19, 2010.Do It!Savage wasA persuasiveB alarmedC courageousD gracious How did Harriet Beecher Stowe's Uncle Tom's Cabin support reform efforts? what groups in the north opposed the emancipation proclamation what would be an explanation of dehumanization in night what absolute value equation gives me the answer: x={-3,8}? Why is the art of 15-year-old Julia Ann Fitch valuable to us today? Write a brief explanation of what is meant by the phrase the carbon cycle, the waste products of one system are the stuff of life for another." 11. Shyam helps his mother with the household chores. While helping his mother in the kitchen, Rohan notices that yellow flame is coming out of the gas stove. He immediately asked his mother to clean the gas stove after cooking is done. Why did he ask his mother to clean the gas stove? Amy bought x pencils at RM 0.60 each and y erasers at RM0.40 each. She sells the pencil atRM0.85 each and the eraser at RM0.60 each. Write an algebraic expression for Amy's total profit,in sen. Mei Mei is taking a multiple choice test. The linear graph below represents her final score if she gets x questions wrong. What does the y-intercept in the graph represent? If you look up in to the sky on a clear,dark night you will see many stars.Put an X next to each statement that describes the stars that are in the night sky.A. Our Sun is a star.B. Stars move across the nightsky.C. Stars have nomass.I. Stars eventually become supernovae andexplode.J. Youseeastarasitwaswhen light left it, not as it is now.D.All stars are the same brightness.K. Stars live forever.L. Stars are very far away.E. The inner core of a star is solid. M. Stars are larger than planets.F. It is common for two stars to N. Stars twinkle.orbit each other.G. Stars are in galaxies.O. Stars are the same color but different temperature