answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
2 years ago
5

Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond

?
(A) response timeout
(B) encapsulation
(C) flow control
(D) access method
Computers and Technology
1 answer:
Rina8888 [55]2 years ago
6 0

Answer:

A. Request timeout.

Explanation:

The end devices like the computer systems in a network seeks to share resources with one another and/ or request resources from central server.

With this, there are two ways computers in a network can communicate. They are peer to peer network communication and client-server network communication.

The client-server communication requires a dedicated central server where computers in the network require data. Peer to peer describes a network where computers serve as both client and server to each other.

Request timeout is a message sent to a source when the time to live period (TTL) of a packet expires.

You might be interested in
Two blue armies are each poised on opposite hills preparing to attack a single red army in the valley. The red army can defeat e
labwork [276]

Answer:

I would attack with one blue army and while all the chaos I would send the foot soldier to the second blue army and tell them to attack with the first. Idk like if the foot soldier is the only way of communication, so yeah

6 0
2 years ago
Read 2 more answers
Another solution to minimize resonance is to ________ the bridge.
lakkis [162]
I believe the answer is d
7 0
2 years ago
Recall that a Set is an abstract data type somewhat similar to a Bag, they can store a finite collection of objects without any
lina2011 [118]

Answer:

Here is the addLikeASet() method:

public boolean addLikeASet(T anEntry){  // method takes the T parameter anEntry

       boolean res = true;  //sets the result to true

       if(Arrays.asList(bag).contains(anEntry);  {  //checks if the bag already contains anEntry

           res=false;         }  //returns false

       else         {   if the bag does not already contain anEntry

           bag[numberOfEntries]=anEntry;  //enters the anEntry in bag array

           numberOfEntries++;         }  //increments the  numberOfEntries by 1

       return res;     } //returns true

Explanation:

You can also implement this method like this:

public boolean isFilled(){ // the function to check if the bag is full

       return numberOfEntries == bag.length;  } // number of entries equals length of the bag which shows that the bag is full

public boolean addLikeASet(T anEntry){

       boolean res=true;

       if (!isFilled() || (Arrays.asList(bag).contains(anEntry));  //checks if the bag is full or contains anEntry already

           res=false;         //returns false

       else         { if bag does not already contain anEntry

           bag[numberOfEntries]=anEntry; //add anEntry to the bag

           numberOfEntries++;         } add 1 to the count of numberOfEntries

       return res;     } //returns true

You can also use a loop to check if anEntry is already present in bag:

for(int i=0; i< bag.length; i++)  {

    if(anEntry.equals(bag[i])) {

      return false;      }    }  

  return true;

3 0
2 years ago
How do I open the Excel workbook "Revenue.xls" from the default directory?
Kobotan [32]
<span>Follow the following steps to open "Revenue.xls":

Step 1:
Open Microsoft Excel.

Step 2:
Click on the "File" button (at top left).

Step 3:
When you click on the File button, the list will pop up which will contain the option "Open."
Click "Open".

Step 4:
Now select the "Revenue.xls" file and open it!

That's it! :)</span>
4 0
2 years ago
"Describe how implementation of a RAID Level 2 system would be beneficial to a university payroll system. In your own words, des
Darina [25.2K]

Answer:

In RAID 2 Hamming Code ECC Each piece of the information word is kept in touch with an information plate drive . Every datum word has its Hamming Code ECC word recorded on ECC circles. On Read, the ECC code confirms the right information or revises the single plate blunders.  

Strike Level 2 is one of the two innately equal mapping and assurance strategies characterized in the Berkeley paper. It has not been broadly sent in the business to a great extent since it requires an extraordinary plate highlights. Since plate creation volumes decides the cost, it is increasingly practical to utilize standard circles for the RAID frameworks.  

Points of interest: "On the fly" it gives information blunder amendment. Amazingly high information move rates is possible.Higher the information move rate required,better the proportion of information circles to ECC plates. Moderately basic controller configuration contrasted with the other RAID levels 3,4 and 5.  

Impediments: Very high proportion of the ECC plates to information circles with littler word sizes - wasteful. Passage level expense are extremely high - and requires exceptionally high exchange rate prerequisite to legitimize. Exchange rate is equivalent to that of the single plate, best case scenario (with shaft synchronization). No business executions can't/not industrially suitable.

4 0
2 years ago
Other questions:
  • Which of the following is not a benefit of active listening?
    8·1 answer
  • Sharon is thinking about opening a bakery. She knows she wants to set her own hours, reduce her stress and make a profit. But sh
    14·1 answer
  • How did josh norman and mike keller provide coverage of katrina?
    9·2 answers
  • In the game Beehive, you play the role of a worker bee who must watch over her hive. Your duties include (among others) directin
    12·2 answers
  • _____________ involves the deployment of malware that secretly steals data in the computer systems of organizations, such as gov
    13·1 answer
  • 1.2.2: Output variable value. Jump to level 1 Write a statement that outputs variable userAge. End with a newline. 1 2 3 4 5 6 7
    12·1 answer
  • In cell E6, create a formula to calculate the percentage of total sales accounted for by DVDs. The formula will divide DVD sales
    15·1 answer
  • Write a function PrintShampooInstructions(), with int parameter numCycles, and void return type. If numCycles is less than 1, pr
    13·2 answers
  • 1.the following code example would print the data type of x, what data type would that be?
    12·1 answer
  • Write any 5 activities that help to remove bad events from the society?​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!