you are an application developer. you are writing a program to exchange video files through a tcp/ip network. you need to select a transport protocol that will guarantee delivery. which tcp/ip protocol would you implement that provides this capability?

Answers

Answer 1

The data link layer is in charge of defining a standard method of interpreting these signals so that network devices can communicate, whereas the physical layer is all about cables, connectors, and sending signals.

What is the importance role of TCP IP protocol?

TCP is important because it establishes the standards and recommended procedures for data transfer over the internet.

It serves as the basis for the internet as we know it today and guarantees that data transfer occurs consistently regardless of the location, technology, or software used.

Therefore, The simple mail transfer protocol (SMTP), which describes how messages are transferred between email servers, defines this process.

Learn more about TCP IP protocol here:

https://brainly.com/question/14397363

#SPJ1


Related Questions

just as in early new orleans jazz, bluegrass musicians engage in collective improvisation.
T/F

Answers

The statement "Just as in early New Orleans jazz, bluegrass musicians engage in collective improvisation" is true because both early New Orleans jazz and bluegrass music feature collective improvisation, where musicians simultaneously improvise their parts while playing together, creating a unique and dynamic sound.

In bluegrass music, there is indeed a tradition of collective improvisation. While bluegrass has a structure and specific roles for each instrument, there are opportunities for musicians to engage in improvised solos and interact with each other during these solos. The musicians may take turns playing solos while the rest of the band provides accompaniment, and there can be moments of spontaneous interplay and response between the musicians.

Collective improvisation in bluegrass allows for a dynamic and collaborative approach to music-making, where musicians listen and respond to each other in real-time, adding their own creative touches to the performance. This improvisational aspect is one of the defining characteristics of bluegrass music and contributes to its lively and engaging nature.

Thus, the given statement is true.

To learn more about musicians visit : https://brainly.com/question/26373912

#SPJ11

Give two reasons why cloud computing could be harmful to an organization?​

Answers

Answer:

Someone else is looking after your data.

Cyberattacks.

Insider threats.

Government intrusion.

Legal liability.

Lack of standardization.

Lack of support.

There's always a risk

Explanation:

Big brain explanation:

A major risk to business continuity in the cloud computing environment is the loss of internet connectivity. Always ask your cloud provider what controls are in place to ensure internet connectivity. If a vulnerability is identified, you may have to terminate all access to the cloud provider until it is rectified.

Other reasons:

~ No longer in control. When moving services to the cloud, you are handing over your data and information.

~ Doesn't mean you should do away with servers.

~ No Redundancy.

~ Bandwidth issues.

Also, may I have Brainliest? :)

1. The supervisory software of a computer is called _____ (a) operating system (b) high – level language (c) transistor

Answers

Answer:

a

Explanation:

who invented the computer?
when was it made?
can u tell me the name of the oldest computer?
when did the first laptop come out?

Answers

The computer was invented by Charles Babbage 15 February 1946Antikythera Mechanism it came out in 1981

Hope it helps you

pls mark my answer as brainliest

Answer:

1 and 2: Charles Babbage invented the computer (he was an English mechanical engineer and polymath) Charles Babbage was deemed the "father of the computer", he thought up and created the very first mechanical computer at the beginning of the 19th century.

3: the first computer was named the ubiquitous x86-powered workhorse of desktop and portable computing. All latest PCs are descendants of the earliest from IBM, the original model 5150 which made its first appearence in August 1981.

4: The first laptop computer available to the public was the Osborne. the Osborne Computer Corporation issued this exact model to the public in the year 1981. It ran at a large price of $1795. At the time of discharge, the screen was about five inches long and the keyboard was on the cover of the computer.

i did a lot of research for this, lol. hope it helps.

(i promise i did not plagerise)

Who here has an old (preferably 80s) Toyota Celica i just bought mine and want to know how you guys like yours because mine is fine ash ;)

Answers

Answer:

Explanation:

The 1980 Toyota Celica is a great car, it was my first car and I loved it. It has many luxury features that you don't see much in cars of that year. It is also extremely reliable and can take lots of use before beginning to give problems. I used to use it to get to and from school on a daily basis and it never once left me stranded. It includes power steering, cruise control, AC, etc. Not much more you can ask for in a car, it is also a very beautiful looking car, especially a well taken care of one. Enjoy your car.

it converts Assembly Language into machine language?​

Answers

Answer:

An assembler.

Explanation:

Input is (as with any programming language) files with lists of instructions (typically assembler mnemonics), output is a binary format representing these instructions in machine language.

a coworker asks your opinion about how to minimize activex attacks while they browse the internet using internet explorer. the coworker recalls there is a setting in the internet options dialog box to prompt the user before downloading activex controls but can't remember which tab to use. what tab would suggest the coworker look in for the activex controls? question 1 options: a) security tab b) privacy tab c) general tab d) programs tab

Answers

I would suggest that the coworker looks in the Security tab for the setting to prompt the user before downloading ActiveX controls. Correct option is A.

The Security tab in the Internet Options dialog box contains a variety of settings related to internet security, including settings for ActiveX controls. By default, Internet Explorer allows websites to download and install ActiveX controls without prompting the user, which can potentially leave the user's computer vulnerable to attacks.

However, by changing the security settings in the Security tab, the user can configure Internet Explorer to prompt them before allowing ActiveX controls to be downloaded and installed.

To find the setting to prompt before downloading ActiveX controls, the coworker can follow these steps:

Open Internet Explorer and click on the Tools icon in the upper-right corner of the window.Select Internet Options from the drop-down menu.Click on the Security tab in the Internet Options dialog box.In the Security tab, click on the Custom level button.Scroll down to the section labeled ActiveX controls and plug-ins.Under the ActiveX controls and plug-ins section, look for the setting labeled Download signed ActiveX controls.Select the Prompt option for this setting.Click OK to save the changes and close the Internet Options dialog box.

By setting the Download signed ActiveX controls option to Prompt, the user will be prompted before downloading and installing any ActiveX controls from websites, which can help minimize the risk of ActiveX-based attacks.

Hence, the correct choice is option a) security tab.

For more question on Security tab click on

https://brainly.com/question/15204689

#SPJ11

9. What command do you enter in the Explorer search box to access the Remote Admin share on the computer named Fin?

Answers

Answer:

\\computername\admin$

Explanation:

Write an 8086 assembly program to will take in two strings from the user as an input and concatenate the two strings and provide the result as the output. You can assume any size for your strings

Answers

The 8086 assembly program  has been written below

How to write the 8086 assembly program

.model small

.stack 100h

.data

   string1 db 50 dup('$')   ; Buffer to store the first string

   string2 db 50 dup('$')   ; Buffer to store the second string

   result db 100 dup('$')   ; Buffer to store the concatenated string

   

   input_prompt1 db "Enter the first string: $"

   input_prompt2 db "Enter the second string: $"

   output_prompt db "Concatenated string: $"

   

.code

   mov ax, data

   mov ds, ax

   

   ; Read the first string from the user

   mov ah, 9

   lea dx, input_prompt1

   int 21h

   

   mov ah, 0Ah

   lea dx, string1

   int 21h

   

   ; Read the second string from the user

   mov ah, 9

   lea dx, input_prompt2

   int 21h

   

   mov ah, 0Ah

   lea dx, string2

   int 21h

   

   ; Concatenate the two strings

   lea si, string1

   lea di, result

   

   ; Copy the first string to the result buffer

   mov cx, 50

   cld

   rep movsb

   

   ; Find the end of the first string

   lea si, result

   mov cx, 50

   mov al, '$'

   repne scasb

   

   dec di  ; Remove the null character from the end

   

   ; Copy the second string to the result buffer

   lea si, string2

   mov cx, 50

   rep movsb

   

   ; Display the concatenated string

   mov ah, 9

   lea dx, output_prompt

   int 21h

   

   mov ah, 9

   lea dx, result

   int 21h

   

   mov ah, 4Ch   ; Exit program

   mov al, 0

   int 21h

   

end

Read more on concatenation here https://brainly.com/question/29760565

#SPJ4

Which tcp/ip configuration information must a computer on a network have before it can communicate with the internet?

Answers

Which TCP/IP configuration information must a computer on a network have before it can communicate with the internet?

To communicate with the internet, a computer on a network must have certain TCP/IP configuration information. This information includes:

1. IP Address: Every computer on a network must have a unique IP address, which is a numerical label that identifies it on the network. This address allows the computer to send and receive data over the internet.

2. Subnet Mask: The subnet mask determines the network portion and host portion of an IP address. It helps the computer identify which devices are on the same local network and which ones are on different networks.

3. Default Gateway: The default gateway is the IP address of the router or gateway device that connects the local network to the internet. It acts as an intermediary between the local network and the internet, allowing the computer to access resources outside of the local network.

4. DNS Server: The Domain Name System (DNS) server is responsible for translating human-readable domain names (like www.example.com) into IP addresses. It helps the computer complete domain names to their corresponding IP addresses, allowing it to access websites and other internet services.

By configuring these TCP/IP settings correctly, a computer on a network can establish communication with the internet.

#SPJ11

Learn more about TCP/IP here:

brainly.in/question/55713450

Python - Write a program to print the multiplication table as shown in the image by using for loops.

Python - Write a program to print the multiplication table as shown in the image by using for loops.

Answers

Answer:

Explanation:

The following python code creates the multiplication table for 10 rows and 10 columns. This code uses nested for loops to traverse the table and print out the product of each multiplication. The image attached shows the output of the code.

for x in range(1, 11):

       for y in range(1, 11):

           z = x * y

           print(z, end="\t")

       print()

Python - Write a program to print the multiplication table as shown in the image by using for loops.

The program to print the multiplication table as shown in the image by using for loops is in the Source code.

The Python program that uses nested for loops to print the multiplication table:

Source code:

for i in range(1, 11):

   for j in range(1, 11):

       if i == 1 and j == 1:

           print("x", end="  ")

       elif i == 1:

           print(j, end="  ")

       elif j == 1:

           print(i, end="  ")

       else:

           print(i * j, end="  ")

   print()

This program will iterate through the values of `i` from 1 to 10 and `j` from 1 to 10. It checks for special cases when `i` or `j` is equal to 1 to print the headers (x and the numbers 1 to 10).

For other cases, it calculates the multiplication of `i` and `j` and prints the result.

Learn more about Nested loop here:

https://brainly.com/question/33832336

#SPJ6

what is sprite in scratch​

Answers

Answer:

Sprites are (little) images, that you can move programmatically.

Explanation:

Sprites are the images on a Scratch computer program screen. Every Scratch program is made up of sprites and the scripts (instructions) that control them. Scripts are programmed to make the sprites do things.

OR

If you want to create a new sprite, you can click the Choose a Sprite button, found at the bottom right of the screen. If you simply want to make the cat move, you can skip ahead to step two. Select a Scratch sprite character using this button at the bottom right of your new project screen.

(Same thing but different wording to understand better)

An example of documentary evidence that might be presented at trial for a cyber crime is:


A. None of these choices.

B. data retrieved from slack space on a hard drive.

C. a cellular telephone.

D. a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses.

Answers

It’s d cause it has valuable info that the person was using to commit the crime

An example of documentary evidence that might be presented at trial for cybercrime is a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses. Thus, option D is correct.

 

What is the evidence?

Evidence is really the data used to attempt to support anything in a court of justice. Evidence is gathered from people, artifacts, and records. The only means through which the court may draw conclusions and reach a ruling is via the use of evidence.

According to the definition of information, it is the demonstration of any claim to be true. A hard copy of a hacker's worksheet with contact information and e-mail accounts is an illustration of documented evidence that might be used in court to prove a cybercrime. Therefore, option D is the correct option.

Learn more about evidence, here:

https://brainly.com/question/14370298

#SPJ2

A train traveled at a constant speed for six hours and traveled a distance of 408 miles. What is the best estimate of the number of miles the train could travel in 2.5 hours? *

Answers

Answer:

this is math but htthe answer is 163.2 but you can just put 163

Expla

System.out.print();

System.out.print("Enter a number less than
100: ");

num = Expo.enterInt();


for (int i=1; I <= num; I++){

if(num %2!=0)

System.out.println(num + " is odd");
else

System.ouy.println(num +"is even")

}

System.out.println();
}
}

Say I enter 5. The loop makes 5 show up 5 times instead of the numbers 1-5 saying if it's even or odd​

Answers

Answer:

write 2:4$+8*

Explanation:

how do the peograms on a computer work

Answers

Answer: Computer programs work by telling the CPU to use input in a given way, manipulate it in another way, and then present the results as wanted. As you type in the words that you wish to, for example, add, the calculator program tells the processor to display them on your computer's screen.

Explanation:

[2 marks]
The company found that the lights were turning on too early in the summer, and too late in the
winter. They decided to change the street light design so that they turn on when the light levels
are below a certain value.
Name a suitable input device for this system. Give a reason for your choice.
Input device: ..
Reason:

[2 marks]The company found that the lights were turning on too early in the summer, and too late in thewinter.

Answers

Answer:

A light sensor, it will detect the light, if there is not enough, the streetlights will have to be turned on.

Explanation:

Answer:

One suitable input device for this system could be a light sensor. The reason for this choice is that the light sensor can measure the ambient light levels and provide input to the system to determine when the street lights should be turned on or off. This allows the system to respond dynamically to changes in the light levels and ensure that the street lights are turned on at the appropriate times.

¿ Porque la madera presenta mayor resistencia a ser cortada en sentido travesal que en sentido longitudinal

Answers

A medida que crece un árbol, la mayoría de las células de madera se alinean con el eje del tronco, la rama o la raíz. Estas células están compuestas por haces largos y delgados de fibras, aproximadamente 100 veces más largas que anchas. Esto es lo que le da a la madera su dirección de grano.

La madera es más fuerte en la dirección paralela al grano. Debido a esto, las propiedades de resistencia y rigidez de los paneles estructurales de madera son mayores en la dirección paralela al eje de resistencia que perpendicular a él

Richard wants to share his handwritten class notes with Nick via email. In this scenario, which of the following can help Richard convert the notes into digital images so that he can share them via email? a. Bar coding device b. Digital printing software c. Document scanner d. Radio frequency identification tag

Answers

Answer: Document Scanner

Explanation: Cos then he can easily add the paper notes to his computer and email the client.


11. In MS PowerPoint
view show the slides of the presentation in thumbnail form.

Outline view
Slide Sorter view
Slide Show view​

Answers

Answer:

slide sorter view .....

Answer: D

Explanation:

how are words and numbers encoded as ones and zeros?

Answers

Answer:Multiple true and false variables

Explanation:

0 is the equivalent to flase variable ande 1 is a true variable

The words and numbers are encoded as ones and zeros by converting the data into assigned ASCII then this data is converted into binary code that is the form of zero and one.

What are binary codes?

Binary codes are those codes that are used by digital computers to understand the data that we enter, The computer does not understand the language we speak. It converts the data into American Standard Code for Information Interexchange first, then it is concerted into binary codes.

The binary codes are in the format of 010010. Each letter has a specific code and these codes are arranged according to the words.

Thus, by first converting the data into assigned ASCII, which is the form of a one and a zero, the words and numbers are then encoded as ones and zeros.

To learn more about binary codes, refer to the link:

https://brainly.com/question/9421694

#SPJ2

a hardware component that facilitates a hardware raid implementation

Answers

RAID, which stands for Redundant Array of Inexpensive Disks, is a storage technology that utilizes multiple hard drives to store data in a fault-tolerant manner.


The RAID controller is a hardware device that connects the disks to the server's motherboard. It is responsible for managing data movement between the disks, monitoring the health of the disks, and rebuilding the data on the disks in the event of a disk failure. The RAID controller is also responsible for handling the RAID configuration settings, such as the RAID level, block size, and cache settings.

A hardware RAID controller provides better performance and reliability than a software RAID controller, as it offloads the processing of RAID operations from the server's CPU to the RAID controller's dedicated processor. In addition, a hardware RAID controller offers better data protection than a software RAID controller, as it has its own cache memory and battery backup unit to prevent data loss due to power outages.

To know more about technology visit:

https://brainly.com/question/9171028

#SPJ11

you are querying a database that contains data about music. each album is given an id number. you are only interested in data related to the album with id number 3. the album ids are listed in the album id column.you write the following sql query, but it is incorrect. what is wrong with the query?

Answers

The SQL query provided for the question is incorrect. In order to understand the error and to correct it, let's first look at the SQL query provided:

SELECT *FROM music

WHERE album_id = 3;

The above SQL query is incorrect because the query doesn't contain any table name. The table name is missing in the FROM clause. The FROM clause specifies the name of the table from where the data is required. In the given query, only the column name is specified, but the table name is missing.In this situation, the query must have the table name from which we want to retrieve data. Therefore, the correct SQL query for this would be:

SELECT *FROM album

WHERE album_id = 3;

In the above query, we have used the table name as "album" instead of "music". The table "album" contains the data about the album and its properties, which include album_id. So, we use the correct table name, which helps the database to look for the required data in the specified table.

Learn more about SQL here:

https://brainly.com/question/30901861

#SPJ11

Required
1. Which of the following is NOT a neutral body position while conducting data entry?
O Crouching forward
O Reclined sitting
Declined sitting
Upright sitting

Answers

Answer:

Declined sitting

Explanation:

You need to have a lot of abs to do that position so naturally it is not a neutral position. Hope I helped!

given: a company has 2 locations: orlando and miami the company has 2000 hosts in orlando and 1000 in miami icann assigns 192.100.0.0 as the starting ip address to orlando give your answer in the cidr standard form such as 123.45.67.89/12 - make sure there are no leading zeroes in any of the four octets used in ipv4 format. what is the cidr subnet starting address for orlando?

Answers

The CIDR subnet starting address for Orlando, given the starting IP address of 192.100.0.0 assigned by ICANN, can be determined by considering the number of hosts required in each location.

Orlando has 2000 hosts, and to accommodate this number, we need a subnet that can provide at least 2,000 addresses. A /23 subnet can provide 2^(32-23) = 2^9 = 512 addresses, which is not enough. A /22 subnet can provide 2^(32-22) = 2^10 = 1,024 addresses, which is still not enough. A /21 subnet, however, can provide 2^(32-21) = 2^11 = 2,048 addresses, which is sufficient to accommodate 2,000 hosts. Therefore, the CIDR subnet starting address for Orlando, using the assigned starting IP address of 192.100.0.0, would be 192.100.0.0/21.

The subnet mask is represented by a "slash" in CIDR subnet. This notation shows how many bits in the mask's binary representation are set to 1. For instance, a subnet mask of 255.255.255.0 can be written as "/24" in CIDR notation since the binary representation has 24 bits set to 1. By streamlining the notation of the subnet mask, CIDR notation makes it simpler to express and interact with IP addresses and subnet masks, especially in large networks. in network administration, CIDR notation is frequently used, notably when setting routers, subnets, and routing tables. Given its widespread use in networking and Internet-related technologies, it is a crucial tool for network professionals to comprehend.

Learn more about CIDR subnet here

https://brainly.com/question/31846584

#SPJ11

Which term is a command that is usef to refer to a set of files called a library in your code

Answers

Answer: Event handler

Explanation:

Event handler Is a command that is used to refer to a set of files called a library in your code.

Jane is applying for an entry-level position as a support specialist at an IT firm. She is creating a résumé and needs to add her current skills.

Which of the following is most relevant to the job?
A. Computer
B. Creativity
C. Math
D. Sensitivity

Answers

A. Computer

I’m sorry if I’m incorrect but I’m pretty sure that right

Given an array-based list implementation, inserting a new element to the current position takes how long in the average case?


Θ(1) time

Θ(logn) time

Θ(nlogn) time

Θ(n) time

Answers

In an array-based list implementation, inserting a new element into the current position takes Θ(n) time in the average case.

To explain this further, when we insert an element into an array-based list at a specific position, we typically have to shift all the elements to the right of the insertion point by one position. In the worst case, this means moving n-1 elements, where n is the size of the array. In the best case, it requires no shifting at all (i.e., when inserting at the end).

However, in the average case, we can assume that the insertion point is somewhere in the middle of the array. Thus, we would need to shift about n/2 elements on average. Since we only consider the order of magnitude, this shifting operation takes Θ(n) time. This is because the time complexity of this operation is directly proportional to the number of elements in the array, and the constant factor (1/2) can be disregarded.

To learn more about array-based list, Visit:

brainly.com/question/31326459

#SPJ11

Read about Social Engineering. Can you think of ways to use social engineering in order to make people less likely to do things that would spread viruses?

Answers

Answer:

I think that if we do baiting attacks use a false promise to pique a victim's greed or curiosity so this could make them scared to go around people and get others sick. I hope that this helps.

you have a class that declares a generic type. you are writing a nested class for this class, and the nested class will use the generic type. does your choice of whether you make the nested class static or not affect how the nested class uses the generic type?

Answers

Making the nested class static affects how it uses the generic type. Non-static nested classes can directly access the generic type, while static nested classes require a separate type parameter.

In a class that declares a generic type, the choice between a static and non-static nested class impacts the usage of the generic type.

For a non-static (inner) nested class, it has direct access to the enclosing class's generic type as it is associated with an instance of the outer class.

However, for a static nested class, it does not have direct access to the outer class's generic type since it's not tied to any instance.

To use the generic type in a static nested class, you need to declare a separate type parameter for the nested class.

In summary, your choice between static and non-static nested classes affects how they use the generic type.

To know more about instance visit:

brainly.com/question/31448417

#SPJ11

Yes, the choice of whether to make the nested class static or not affects how the nested class uses the generic type.

If the nested class is static, it cannot access the type parameter of the outer class and cannot use it as a type argument. Therefore, the nested class must declare its own type parameter(s) or use a non-generic type. On the other hand, if the nested class is non-static, it can access the type parameter of the outer class and use it as a type argument, or declare its own type parameter(s) if necessary. In summary, whether the nested class is static or not affects whether it can directly use the type parameter of the outer class or must declare its own type parameter(s).

To know more about nested class,

https://brainly.com/question/14142186

#SPJ11

Other Questions
which following food chain grass grasshopper field mouse red tailed hawk which organism in the food chain is the producer Why were the Jews victims of genocide during World War II When compared to other job types, the ________ of hr specialists has increased at a faster rate. (NEED ANSWER QUICKLY)Write a response to Pablo structured as an email. To get full points make sure to include A saludo (greeting) and a despedida (farewell) Answers to all the questions from the email. At least 3 adjectives that describe some of the things in or about your school. You should use different adjectives, not the same one over and over. Remember that adjectives need to agree in gender and number with what they describe. PABLOS EMAIL: ?Como estas me llamo pablo. Quiero saber como es tu escuela. ?Cuantas clases tienes? ?Que hay en tu salon? En mi escuela hay muchos libros rojos. tengo tres clases interesantes y una clase aburrida. Mi escritorio es pequeno y tengo todo en mi mochila negra The sixth-grade class is raising money to have aclass trip at the end of the year. They began the yearwith $1,500. Now they have $1,650 in the account.What is the percent increase for the money the classhas raised? What is the epic of Gilgamesh an example of? Multiply.2 1/4(2 1/3)I give you 15 points explain me the sentences considering grammar rules: I was reading a book when he came. What is the name of the polyatomic in MgSO4? compensation refers to the application of alternative methods to achieve goals when circumstances make prior methods less usable. True or false? In the story about Steves near miss while driving his cousins Camaro what did his mom hit him with A performer in seventeenth-century France delivering a line with a flourish at the end in order to prompt the audience to applaud is an example of 40. the space that occurs between opposing occlusal surfaces during mandibular protrusion is known as: Wildhorse Repairs has 200 auto-maintenance service outlets nationwide. It performs primarily two lines of service: oil changes and brake repair. Oil change-related services represent 70% of its sales and provide a contribution margin ratio of 20%. Brake repair represents 30% of its sales and provides a 40% contribution margin ratio. The company's fixed costs are $14,040,000 (that is, $70,200 per service outlet). Sales mix is determined based upon total sales dollars. Calculate the dollar amount of each type of service that the company must provide in order to break even. (Use WeightedAverage Contribution Margin Rotio rounded to 2 decimal places e.8. 0.25 and round final answers to 0 decimal places, e.8. 2,510.)Sales dollar needed per productOil changes $Braker repair $ Which is more abundant, Organic compounds or Inorganic compounds? Where is oxygen added to the blood? Which is an enequality which of the following best describes an opinion leader? group of answer choices one who is able to influence the opinions of others because of position, expertise, or personality always someone whose job is to sway public opinion, such as a member of congress someone who relies on position or expertise, rather than something like personality a pollster a public relations expert Which type of fertilizer is made from natural wastes?inorganicchemicalorganic Assume that you have been interviewed for the job for which you created your letter of application and resume. Write a follow-up e-mail expressing thanks for the interview.Your e-mail should include:1.E-mail formatting2.Your thanks for the interview and individuals that gave you special help or attention during the interview3.The name of the specific job for which you interviewed4.You impression that the job is attractive5.Your confidence that you can preform the job well.6.An offer to provide additional information or answer additional questions.