a client packet is received by a server. the packet has a destination port number of 53. what service application is the client requesting?

Answers

Answer 1

If the packet has a destination port number of 53, it means the service application that client is requesting is DNS.

A Service is an application component that may carry out long-running operations in the background. It does now no longer offer a consumer interface. Once started, a carrier may keep running for some time, even after the consumer switches to every other software. The area call device (i.e., “DNS”) is liable for translating domains into a particular IP cope with in order that the beginning consumer can load the asked Internet resources. The domain name device works just like a phone book where customers can search for a requested person and retrieve their phone number.

Learn more about DNS at

#SPJ4


Related Questions

What term is used to the describe the activity where the eller design team examined aspects, such as the content, navigation, and information architecture, of the webpages of our peer institutions for ideas that we might integrated into our new design?.

Answers

Competitive analysis is the term used to the describe the activity where the Eller design team examined aspects, such as the content, navigation, and information architecture, of the webpages of our peer institutions for ideas that we might integrated into our new design.

What is webpage?

Web page is defined as a digital file linked to the internet that may be seen by anybody with a web browser who is connected to the internet. A website is made up of numerous web pages connected by a common domain name.

Competitive analysis is defined as the practice of finding rivals and assessing their tactics to identify gaps and strengths and improve your own business.

Thus, competitive analysis is the term used to the describe the activity where the Eller design team examined aspects, such as the content, navigation, and information architecture, of the webpages of our peer institutions for ideas that we might integrated into our new design.

To learn more about webpage, refer to the link below:

https://brainly.com/question/21587818

#SPJ1

an engineer would like to remove the network commands in ospf configuration mode. what cisco ios command does this engineer need to use?

Answers

In OSPF configuration mode, an engineer would use the no network network-id and area area-id subcommands to remove the network commands.

Information About OSPF:

OSPF is an Interior Gateway Protocol (IGP) designed specifically for IP networks, and it supports IP subnetting as well as tagging of externally derived routing information.

OSPF also supports packet authentication and sends and receives packets using IP multicast. RFC 1253 and the OSPF management information base are supported by the Cisco implementation.

The Cisco implementation adheres to the OSPF Version 2 specifications by including the following key features:

Definition of stub areas is supported.Routes learned through one IP routing protocol can be redistributed into another. This means that OSPF can import routes learned through EIGRP and RIP at the intradomain level. Routes from OSPF can also be exported to RIP.Plain text and MD5 authentication are supported between neighboring routers within an area.Interface output cost, retransmission interval, interface transmit delay, router priority, router dead and hello intervals, and authentication key are all configurable routing interface parameters.Virtual links are supported.Not-so-stubby-areas (NSSAs) per RFC 1587are supported.

To know more about OSPF, visit:https://brainly.com/question/4671111

#SPJ4

Give at least 5 SQL Schema Roles.

Answers

The 5 SQL Schema Roles are:

For server principals without any explicit securable object permissions, the public role is the default.Dbcreator is able to change, create, delete, or restore databases.Disk files can be managed via diskadmin.BULK INSERT can be performed using bulkadmin.setupadmin has the ability to execute Transact-SQL and add/remove associated servers.What in SQL are a role and a schema?

Objects like tables, stored procedures, and other types of data are simply contained in a SQL Server schema. Windows logins, SQL Server users, and other principals make up a database role.

Role schemas are our preconceived notions of what behavior is appropriate for a particular social role. For instance, we anticipate friendly service from a waiter. Our schema determines our expectations of each waiter we interact with, even though not all of them will behave that way.

Hence, To assist you in controlling server permissions, SQL Server offers server-level roles. These are security principals that serve as groups for other principals. The scope of the permissions for server-level roles is the entire server. (In the Windows operating system, roles resemble groups.)

Learn more about SQL Schema from

https://brainly.com/question/28848346
#SPJ1

match each description on the left with the appropriate cloud technology on the right.
a. Provides cloud services to just about anyone.
b. Allows cloud services to be shared by several organizations.
c. Provides cloud services to a single organization.
d. Integrates one cloud service with other cloud services.
1. Public cloud
2. Hybrid cloud
3. Community cloud
4. Private cloud

Answers

The match of the description from the left and the cloud technology on the right is:

a. Provides cloud services to just about anyone: - Public cloud.

b. Allows cloud services to be shared by several organizations: Community cloud.

c. Provides cloud services to a single organization: Private cloud.

d. Integrates one cloud service with other cloud services: Hybrid cloud.

What is cloud service?

The service known as “cloud computing” operates via internet technologies. Software-as-a-service (SaaS) is a notion that is part of cloud computing that is used to host applications by any third party and offer them to users as services.

Platform-as-a-service (PaaS) is a model where a third party offers the user the tool for application development.

Therefore, the correct match is a: 1. Public cloud, b: 3. Community cloud, c: 4. Private cloud, d: 2. Hybrid cloud.

To learn more about cloud service, refer to the link:

https://brainly.com/question/11014710

#SPJ1

language form comprises which of the following elements? question 25 options: a) syntax b) pragmatics c) semantics d) meaning making

Answers

Syntax (grammar) is the set of language components that are included under "form" as syntax is the set of rules that are used to describe and explain the ways in which words are related in a sentence.

What is Grammar?

It is the structure and system of a language, or of languages in general, which is usually thought to include syntax and morphology.

Grammar is a language's system. Grammar is sometimes referred to as a language's "rules," but no language has rules*. When we say "rules," we mean that someone created the rules first and then spoke the language, as if it were a new game.

However, languages did not begin in this manner. Languages evolved from people making sounds into words, phrases, and sentences. There is no universal language. Every language evolves over time. What we call "grammar" is simply a snapshot of a language at a specific point in time.

What Is Syntax?

In English, syntax refers to the arrangement of words and phrases in a specific order. It is possible to change the meaning of an entire sentence by changing the position of just one word. Every language has its own set of rules for which words go where, and skilled writers can bend these rules to make sentences sound more poignant or poetic.

To learn more about Syntax, visit: https://brainly.com/question/831003

#SPJ4

a web form is going to allow uploaded files, the _____ must be included in the tag



a. file name


b. database manager name


c. upload attribute


d. enctype attribute

Answers

A web form is going to allow uploaded files, the enctype attribute must be included in the tag.

What do you mean by web form?

Users of your website can request web forms through their browsers. A combination of HTML, client script, server controls, and server code may be used to create these pages.

What is server controls mean?

The tags that the server can understand are called server controls. Basically, there are three different kinds of server controls. On the server side, ASP.NET offers a mechanism to deal with HTML Server controls; working with a collection of controls together is referred to as HTML Controls.

When form data is submitted to the server, the enctype attribute specifies how it should be encoded. Only when method="post" is used may the enctype attribute be utilised.

Hence, the enctype attribute must be included in the tag.

To learn more about the Server from the given link

https://brainly.com/question/9257742

#SPJ1

a bit string contains 1's and 0's. how many different bit strings can be constructed given the restriction(s)? length is 24.

Answers

2^24 different bit strings can be constructed given the restriction(s).

What do you mean by string?

A string is generally a sequence of characters in computer programming, either as a literal constant or as some form of variable. The latter can have its elements modified and its length changed, or it can be fixed (after creation). A string is commonly implemented as an array data structure of bytes (or words) that records a sequence of elements, typically characters, using some character encoding. Strings can also be used to represent more broad arrays or even other sequence (or list) data types and structures.

To learn more about string
https://brainly.com/question/25324400

#SPJ4

The resource mentions that if the irs owes you a refund, you won’t be penalized if you file your tax return late. Why might you want to file your tax return on time anyway?.

Answers

We want to file your tax return on time anyway because of :

Avoid losing future refunds.Avoid added interest and penalties.Safeguard credit.

What is tax ?

Taxes are compulsory payments made by a government organization, whether local, regional, or federal, to people or businesses. Tax revenues are used to fund a variety of government initiatives, such as Social Security and Medicare as well as public works and services like roads and schools.

Two sanctions might be used:

Late filing is subject to one penalty, while late payment is subject to another. They can quickly mount up. Penalties are added on top of interest.

Penalty for filing late:

The minimum fine is typically $210 if taxpayers file their 2018 tax return more than 60 days late. 100 percent of the overdue tax is due if the amount of tax outstanding is less than $210. If not, there could be a penalty of up to 5 percent of the unpaid tax per month, with a maximum penalty of 25 percent. If the taxpayer is entitled to a refund, submitting late is not subject to a penalty.

Penalty for late payments:

The penalty is typically 0.5 percent of the unpaid tax per month, or half of one percent. It can increase to as much as 25% of the outstanding tax. For taxpayers who have a payment agreement with the IRS, the penalty rate is reduced by half. In such situation, it amounts to 0.25 percent—or one-fourth of one percent—per month.

Monthly combined penalty :

The maximum amount levied for the late filing and late payment penalties, if they both apply, is 5 percent per month.

Learn more about tax return click here:

https://brainly.com/question/27300507

#SPJ1

1} What are ways in which computer programs can be improved for efficiency?
A) Avoiding recognizing patterns
B) Breaking a problem down into smaller steps and recognizing relevant patterns
C) Writing functions in programs in large chunks, rather than as independent parts
D) Writing functions that can only be used to solve one problem

2} Which of the following would be an optimal data structure for storing a text information?
A) Dictionary
B) Integer
C) List
D) String

3} What data type is best suited to store the length of a string?
A) Boolean
B) Integer
C) List
D) String

4} Which of the following are best commenting practices?
A) Identify all of the output statements.
B) State the obvious.
C) Use block comments for long comments.
D) Use triple quotes to comment.

Answers

Answer: 1. B) Breaking a problem down into smaller steps and recognizing relevant patterns

2. D) String

3. B) Integer

4. D) Use triple quotes to comment.

Explanation:

What function should you use to look up a specified value within a database at the intersection of a specific row and columnposition?.

Answers

The index Function is used to look up a specified value within a database at the intersection of a specific row and column position.

What does Database mean?

A database is a planned grouping of material that has been arranged and is often kept electronically in a computer system. A database management system often oversees a database (DBMS).

What is an INDEX formula?

The INDEX function extracts a value from a table or range, or a reference to a value, and returns it. Play. The INDEX function can be applied in one of two ways: See the Array form if you wish to return the value of a specific cell or array of cells. See the Reference form if you want to give a reference to a set of cells.

The INDEX MATCH[1] Formula combines the INDEX[2] and MATCH[3] Excel functions. Based on the column and row numbers, the function =INDEX() retrieves the value of a cell in a table. The position of a cell in a row or column is returned by =MATCH().

Hence, the INDEX function is used.

To learn more about the Database from the given link

https://brainly.com/question/518894

#SPJ1

the name of a function identifies it and must be used when the function is called. group of answer choices

Answers

It is True that the name of a function identifies it and must be used when the function is called.

What is Function Identifiers?

The data item that emerges from the evaluation of a function is uniquely referenced by a sequence of character strings and separators known as a function-identifier.

Anywhere that a data item of category alphanumeric or category national, respectively, can be referenced and where references to functions are not expressly forbidden, a function-identifier that refers to an alphanumeric or national function may be stated. The exceptions are as follows:

any statement's receiving operandWhen a data item must have specific characteristics (including class, category, size, sign, and allowable values), and the evaluation of the function in accordance with its definition and the provided parameters does not produce a data item that meets these requirementsAnywhere an arithmetic expression can be used, a function-identifier that refers to an integer or numeric function can also be utilized.

Learn more about Function identifiers click here:

https://brainly.com/question/28364615

#SPJ4

which of the following is an example of a cash inflow from operating activities? which of the following is an example of a cash inflow from operating activities? receipt of cash equal to the book value of piece of equipment sold. collection of an accounts receivable. none of these are are operating activities. collection of cash related to a note receivable.

Answers

The one that is an example of a cash inflow from operating activities is receipt of cash equal to the book value of piece of equipment sold. The correct option is A.

What is cash inflow?

Cash inflow refers to money coming into a business from sales, investments, or financing. It is the inverse of cash outflow, which is money leaving the company.

The process of moving cash outside the business due to the various liabilities that a business has during the course of its operations is referred to as cash outflow.

Sales and growing investments typically generate cash inflow. If your company is making daily sales, your cash flow will reflect that. If you're making long-term investments, you might not see that cash inflow as frequently.

Receiving cash equal to the book value of a piece of equipment sold is an example of a cash inflow from operating activities.

Thus, the correct option is A.

For more details regarding cash inflow, visit:

https://brainly.com/question/14253442

#SPJ1

What variable/s can you manipulate in the simulation to make all the items get the same proximate values for their acceleration? explain how this idea will work.

Answers

The variable that can be manipulated in the simulation to make all the items get the same proximate values for their acceleration is the final velocity.

What are variables?

The table reveals that their initial velocities are all the same and are all zero. So in order to achieve the same result, the end velocity will need to be changed to approximate acceleration values for them.

Acceleration is the rate at which a speed changes over time, and it occurs when the acceleration is constant or equal to zero, then it is zero. If the last is the values of all the parameters' velocities are extremely near, they will have approximate acceleration values.

Therefore, the variable that can be manipulated is the final velocity.

To learn more about variables, refer to the link:

https://brainly.com/question/19234698

#SPJ1

to include jquery ui in your application, you must first include the core jquery library. after that, which files and folders do you need to include?

Answers

The external folder, the jQuery UI compressed file, and the pictures folder the external folder, the jQuery UI files that have been compressed, the pictures folder, and the external folder.

What is jQuery?jQuery is a JavaScript library created to make event handling, CSS animation, Ajax, and DOM tree navigation and manipulation easier. It is open-source software that is available for free under the MIT License.The goal of jQuery is to make using JavaScript on your website more simpler. With the help of jQuery, you can perform many basic activities that would otherwise require numerous lines of JavaScript code by calling methods instead. jQuery is significantly easier to use than JavaScript for event handling, DOM manipulation, and Ajax calls, even though JavaScript is the foundational language from which it grew.

To learn more about jQuery refer to:

https://brainly.com/question/29313631

#SPJ4

you are configuring a server that will be used by an external organization. what is required when you install the ad fs role on a windows 2016 server?

Answers

you are configuring a server that will be used by an external organization. Web Application Proxy servers Web Application Proxy servers.

What is a proxy server?

A proxy server is a server program used in computer networking that stands between a client and the server supplying the resource that the client is requesting. A proxy server is a server program used in computer networking that stands between a client and the server supplying the resource that the client is requesting.

Proxies add a significant degree of protection to your machine. They can be configured as firewalls or web filters to defend your computer against online dangers like viruses.

This added security from a proxy server is also beneficial when used in conjunction with a secure web gateway or other email security tools. Using this method, you can filter traffic based on the level of security it offers or the volume of traffic your network—or certain computers—can handle.

To learn more about proxy server, use the link given
https://brainly.com/question/9257742
#SPJ4

a vertex shader creates an out variable. a fragment shader creates the same variable, but as an in variable. the step that connects the two is:

Answers

The step that connects the two is matrix variable.

What is meant by matrix variable?A matrix (plural 'matrices') is a set of numbers laid out in rows and columns in computer science and mathematics. A matrix's numbers can represent data or mathematical equations.A matrix is a collection of numbers that are arranged in rows and columns to form a rectangular array. The numbers are referred to as matrix elements or entries. Matrices are widely used in engineering, physics, economics, and statistics, as well as in many branches of mathematics.Matrix is a quality glossary definition. Also known as a matrix or a matrix chart. A matrix diagram is a new management planning tool for analyzing and visualizing the relationship between data sets. The matrix diagram depicts the relationship between two, three, or four data groups.

To learn more about matrix variable refer to:

https://brainly.com/question/28181889

#SPJ4

A newborn experiences frequent periods of cyanosis, usually occurring during crying or after feeding. Which cardiac diagnosis does this history support?.

Answers

A infant has frequent episodes of cyanosis, which commonly occur during crying or after eating. This history is supported by the Fallot tetralogy.

What is cyanosis?

Cyanosis is the change of body tissue color to a bluish-purple hue as a result of having decreased amounts of oxygen bound to the hemoglobin in the red blood cells of the capillary bed. Body tissues that show cyanosis are usually in locations where the skin is thinner, including the mucous membranes, lips, nail beds, and ear lobes. Some medications containing amiodarone or silver, Mongolian spots, large birth marks, and the consumption of food products with blue or purple dyes can also result in the bluish skin tissue discoloration and may be mistaken for cyanosis.

Cyanosis occurs in infants with tetralogy of Fallot after crying or during nursing. Cyanosis may occur in infants with AVC defects, although it is unrelated to feeding or crying. Cyanosis does not occur in infants with VSD or ASD.

To learn more about cyanosis
https://brainly.com/question/16109378

#SPJ4

you have created several shares on your macos computer, and you want to be able to easily set permissions on the shares so several other users on other macos computers can access the shares. what type of account should you create?

Answers

Share permissions come in three flavors: Full Control, Change, and Read. To limit access to shared drives or folders, you can set each of them to "Deny" or "Allow."

Explain about the Share permissions?

Right-click the folder you want to share in Windows Explorer and select Properties. Click Advanced Sharing under the Sharing menu. Click Continue to acknowledge the message that Windows needs your permission to carry out the action under User Account Control.

Share permissions essentially have three degrees of sharing: Full Control, Change, and Read, and they are more generally applicable to files and folders. When you share a folder, you can approve or reject each of these things, as follows: Read: Similar to the NTFS permission above is this.

Simply put, share permissions let you manage who has access to certain networked folders. You cannot restrict access to certain subfolders or items on a share using share permissions.

To learn more about Share permissions refer to:

https://brainly.com/question/14178838

#SPJ4

17. every time attribute a appears, it is matched with the same value of attribute b, but not the same value of attribute c. therefore, it is true that:

Answers

Multivalued dependency is a specific instance of a join dependency. When a table contains many independent multivalued properties, the condition known as multivalued dependency arises

What is multivalued dependency and what does it look like?When a table contains many independent multivalued properties, the condition known as multivalued dependency arises. As an illustration: Consider a bike manufacturer that annually manufactures each model in two colors (black and white). Bike model, year of manufacture, and color.With only two sets of values involved, or a binary join dependency, a multivalued dependency is a specific instance of a join dependency.Multiple rows in a table are referred to as having an MVD, or multivalued dependency. As a result, it suggests that there are numerous other rows present in the same table. A multivalued dependency would therefore prohibit the 4NF. Any multivalued dependency would at the very least involve three table characteristics.

To learn more about Multivalued dependency refer to:

https://brainly.com/question/28812260

#SPJ4

during a meeting at work, your boss starts talking about something called desktop as a service (daas). what can you likely assume about this technology based on its name?

Answers

During a meeting at work, your boss starts talking about something called desktop as a service (daas). The person will access this service over the Internet in spite of assuming about it.

What is the desktop as a service?

With Desktop as a Service (DaaS), the cloud services provider hosts the infrastructure, network resources, and storage in the cloud while streaming a virtual desktop to the user's device. The user may then access the data and apps on the desktop through a web browser or other software.

Therefore, a supervisor brings up a desktop as a service during a meeting at work (daas). Despite their presumptions, they will use the Internet to obtain this service.

To learn more about the desktop as a service, refer to the link:

https://brainly.com/question/16201038

#SPJ1

of the ad formats available on the display network, which one will automatically adjust its presentation to best fit the available space on page?

Answers

Responsive display  ads  will automatically adjust its presentation to best fit the available space on page.

What is meant by Responsive display ads?Ads that are responsive immediately modify their dimensions, visual style, and format to fit available ad slots. Consequently, a single responsive ad may show up as a large image ad in one location and a small text ad in another.The presentation of responsive display advertisements will automatically change to best fit the area on the page.The main distinction between responsive display ads and standard display ads is their versatility. As was already mentioned, responsive display ads instantly modify their shape, size, and format to fit into open ad spaces on that particular website.

To learn more about Responsive display ads refer to:

https://brainly.com/question/14918847

#SPJ4

the re-execution of some subset of tests that have already been conducted to ensure that changes have not propagated unintended side effects is known as:

Answers

Regression testing is the process of running a subset of tests again to make sure that modifications have not caused unforeseen side effects.

What is Regression testing ?

Re-running functional and non-functional tests is known as regression testing, and it is done to make sure that previously designed and tested software continues to function as intended after a change. If not, that is referred to as a regression.

Regression testing may be necessary for modifications like as bug repairs, software upgrades, configuration changes, and even the replacement of electronic parts. Test automation is widely used since regression test suites tend to expand as more flaws are discovered. An acceptable subset of tests may be chosen by performing a change effect analysis.

Emergence of new faults and/or re-emergence of old faults is quite common as software is updated, changed, or reused on a modified target. Re-emergence can occasionally take place as a result of poor revision control procedures losing a fix.

To learn more about Regression testing refer :

https://brainly.com/question/13327687

#SPJ4

when performing keyword research, how can you determine which keywords you should create content for?

Answers

When performing keyword research, based on the factors such as relevance, authority, and volumes you determine which keywords should be used to create content.

Keyword research assists you to find which keywords are best to use in order to target and provide valuable insight into the queries that your potential audience is actually searching on search platforms such as Go-ogle. The insight that you can get into these actual search keywords or terms can help inform content strategy and larger marketing strategy.

These are the factors that take inot consideration to facilitate an effcetive keyword search:

Relevance: Content is ranked on search platforms for its relevance. Authority: The search platforms provide more weightage to the sources that tend to be authoritative.Volume: It measures the number of times the keyword is searched across all audiences per month.

You can learn more about keyword research at

https://brainly.com/question/13522767

#SPJ4

TRUE/FALSE. a game writer and a game designer are two distinctly different jobs that require different skill sets.

Answers

True. Writing the game and actually developing is completely different. Think of it as a coloring page: you could color it in, sure, but could you redraw the image?

what type of hidden data in pdf documents and microsoft word files contain useful information that can be used for social engineering?

Answers

Meta data is the hidden data in pdf documents and microsoft word files contain useful information that can be used for social engineering because Metadata is a collection of information about a specific file. These pieces of information include user names, operating systems, author names, software versions, and, in rare cases, Mac addresses.

Hackers compile and analyze this data in order to plan attacks and crack sensitive data.

What is Metadata?

Metadata, in its most basic form, refers to data about data. Metadata is present in every file that you share, receive, download, or upload.

Metadata's purpose is to provide a summary of big data, including its description, context, and characteristics.

Let’s take an example of an image. When you click an image, you automatically see its metadata that contains the elements below:

Date and timeCamera settingsFilename Device nameGeolocation (if enabled).

What is Social Engineering?

Social engineering is a deception technique that takes advantage of human error to obtain sensitive information, access, or valuables.

These "human hacking" scams in cybercrime tend to entice unsuspecting users into exposing data, spreading malware infections, or granting access to restricted systems. Attacks can occur online, in person, or through other interactions.

To know more about Metadata, visit: https://brainly.com/question/28900812

#SPJ4

is a type of email service that stores messages on a server and uses abrowswert to casdess those messagez

Answers

A common email retrieval (incoming) protocol is known as IMAP, or Internet Message Access Protocol.

What is email retrieval?

When working with a mail delivery agent to deliver mail to a local or distant email mailbox, a mail retrieval agent (MRA) retrieves or fetches email from a remote mail server.

With IMAP, you may use any device to access your email from anywhere. When using IMAP, you are reading an email message from the email service rather than downloading or saving it on your computer. As a result, you may access your email from a variety of devices and locations throughout the globe, including your phone, a computer, and a friend's PC.

IMAP does not automatically download attachments; instead, it waits until you click on a message to download it. You can check your mails much faster this way than you can using POP.

Learn more about IMAP click here:

https://brainly.com/question/14311364

#SPJ4

write and execute an sql create table statement in ssms to create the customer 01 table. (provide the select statement script and screenshot of the execute/output from the select/script statement and paste below for this question.)\

Answers

Written a program for execute an sql  create table statement in ssms to create the customer 01 table

Use of a two-part name is required to create a table in a particular schema in sql . The database must contain the schema for which the table is being created. For instance, if you want to create a table called tblPatient in the Patients schema, the definition for creating the table will look like this:

CREATE TABLE [customer ].[01 table](

   [customer _ID] [bigint] IDENTITY(1,1),

   [customer t_code] [varchar](50),

   [customer _name] [varchar](50),

   [Address] [varchar](25),

   [City] [varchar](50),

   [AppointmentDate] [datetime],

 ) ON [PRIMARY]

To create a new table in a database, use the CREATE TABLE statement. We must include the filegroup name in the CREATE TABLE statement in order to create a table in the secondary filegroup. Ensure that the database already contains the filegroup in which you are creating the table. When you want to keep your frequently accessed tables on a different disk, creating a table in a secondary filegroup can be helpful.

Learn more about sql here:

https://brainly.com/question/13068613

#SPJ4

Specific promotional tools used in​ __________ include​ stories, sponsorships,​ events, and web pages.

Answers

Specific promotional tools used in​ public relations include​ stories, sponsorships,​ events, and web pages.

What are public relations?

In order to control how information about a person or organization is shared with the public, particularly the media, a set of techniques and strategies are used in public relations (PR). Disseminating significant company news or events, upholding a brand's reputation, and giving negative situations a positive spin in order to lessen the negative effects are its main objectives. PR can take place through a company press release, news conference, journalist interviews, social media posting, or in other ways.

The following are the types of public relations:

1)Media

2)Investor

3)Public

Hence to conclude Public relations include stories etc

Follow this link to know more on Public relations

https://brainly.com/question/20313749

#SPJ4

which step in the link-state routing process is described by a router building a link-state database based on received lsas?

Answers

Building the topology table in the link-state routing process is described by a router building a link-state database based on received lsas.

What do you mean by database?

A database is a structured collection of data that is stored and retrieved electronically in computing. Small databases can be stored on a file system, however large databases must be stored on computer clusters or in the cloud. Database design encompasses both formal techniques and practical factors, such as data modelling, efficient data representation and storage, query languages, sensitive data protection and privacy, and distributed computing issues such as concurrent access and fault tolerance.

To learn more about database
https://brainly.com/question/24027204

#SPJ4

if you set up a network in your home to share your internet connection with several laptops, what type of network have you created?

Answers

You might want to set up a peer-to-peer network, if you have many computers at your house and want to utilize them all to access the Internet.

A distributed application architecture known as peer-to-peer (P2P) computing or networking divides jobs or workloads across peers. Peers are equally qualified and capable members of the network. They are referred to as the nodes in a peer-to-peer network.

Without the need for central coordination by servers or reliable hosts, peers make a portion of their resources, such as processing power, disk storage, or network bandwidth, directly available to other network users.

In contrast to the conventional client-server model, where resource consumption and supply are segregated, peers are both resource suppliers and consumers.

Although peer-to-peer network systems had previously been used in numerous application domains, the architecture was made well-known by the 1999-original file-sharing program Napster.

To know more about peer-to-peer network click here:

https://brainly.com/question/10571780

#SPJ4

Other Questions
Question 7After the final audit of sales results, the West Region needs to have their sales updated for Q3 to $15,740. What cell would you click on to make that change?1 pointA1C4D4D3 the sum of two numbers is 21, the second number is 6 times more than the first on what are the 2 numbers In medieval europe, a ___ was an association of artisans or workers skilled in a certain craft. box a contains 2 white balls and 4 red balls, whereas box b contains 1 white ball and 1 red ball. a ball is selected at random from box a and put into box b and then a ball is randomly selected from box b. (a) what is the probability that the ball selected from box b is white? (b) what is the probability that the transferred ball was white given that the ball selected from box b was white?1 (j) describe an anthropogenic occurrence that could require re-establishing a forest in an area with previously established soil. explain the history of Ethiopian modern constitution Camilla visited her parents in Belmont and took them out to dinner. Their dinner cost $112, and the sales tax in Belmont is 9%. If Camilla left an 18% tip on the $112, how much in total did she pay? financial reporting standards for state and local government are determined by the governing body known as ___________ , while international standards are compiled in the governing principles known as ________ . a.) sec; gaap b.) aicpa; irs c.) gasb; ifrs d.) fasb; gao Csecond chancel Review your Carter and Naomi are stood on opposite sides of a phone mast. The phone mast is 130 m tall. The angle of elevation from Carter to the top of the mast is 73. The angle of elevation from Naomi to the top of the mast is 41. Work out the distance between Carter and Naomi. Give your answer to the nearest metre. Which of the following is most likely to be encoded automatically? aThe license plate of your new car bThe names of your cousins cWhat you ate for breakfast this morning dThe names of the last 10 US Presidents eThe side-angle-side geometry theorem Which of the qualities is a major difference between all spore-dispersing and seed-dispersing plants?. Find the common difference of the arithmetic sequence: { 8, 5, 2, -1, -4, ...}d= After a movie has ended, an elderly man falls when walking down the steps of the crowded theater. There is an extremely long pause before anyone moves to help the man. This is an example of. a client is to receive an iv of sodium chloride 0.9% injection (normal saline) 250 ml with kcl 10 meq iv over 4 hours. what rate should the nurse program the client's iv infusion pump? What should be capitalized in the title The war between the worlds? molecules change from being a liquid to a gasthroughout the substance (True or false) 9/14 as a decimal rounded to nearest hundredth I really need help on this math assignment its about probability and if work can be shown that would be great I will give 35 points originally promoted in disaster recovery work, the social and technical skills and strategies of individuals/groups directed towards responding to environmental or socioeconomic changes is referred to as: 35. in 1876, japan employed gunboat diplomacy to force the treaty of kanghwa in korea. this opened three ports to trade with japan and: