1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
2 years ago
14

Which network protocol is used to handle delivery of information

Computers and Technology
1 answer:
rodikova [14]2 years ago
6 0

Answer:

TCP

Explanation:

TCP stands for Transmission Control Protocol a communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.

You might be interested in
LAST TIME ASKING FOR APPS THAT ARE FREE THAT I DONT NEED TO PAY THE APPS HAVE TO HELP ME STOP VIRUSES FROM MY PHONE PLZ HELP THE
pashok25 [27]

Answer:

i wish i could help u but i cant find a "free" one

Explanation:

4 0
3 years ago
Read 2 more answers
Best free vpn to bypass geo tagging
Mamont248 [21]

Answer:

Nord VPN

Explanation:

5 0
4 years ago
D. What is the work of the following features:<br>1. Foot note​
Bess [88]

Answer:

In footnotes, information is separated by commas, while in the bibliography, it is separated by periods.

In footnotes, the author's first name is listed first, while in the bibliography, the author's last name is listed first.

The titles of books and journals are put in italics.

The titles of articles are put in quotation marks.

All key words in titles are capitalized.

Explanation:

3 0
3 years ago
If your computer system is not working correctly, you can use System Restore to return the ___________ ____________ to an earlie
Luden [163]

You can use System Restore to return the computer file history to an earlier point in time.

Explanation:

System Restore allows you to recover documents/files that may have been deleted if your computer is not operating as it should be. Therefore, the answer is "computer file history".


Hope this helps!

7 0
4 years ago
A company is inviting design for its new corporate logo from its users. This is an example of ? A. Crowdfunding B. Crowdvoting C
adoni [48]

a crown Source because is beautiful in its own way and it'll be a nice company because you can own the company in a beautiful way now will people wakes blow and now there is not a company that's named the same thing and over and over again

6 0
3 years ago
Read 2 more answers
Other questions:
  • Mile markers appear as _____ green signs.
    6·2 answers
  • A user can easily move to the end of a document by pressing the _____ key combination.
    10·2 answers
  • Post secondary education refers to:
    13·1 answer
  • I have to writea piece of code to calculate the factorial of somewhat large numbers so the long long type won't suffize, so usin
    7·1 answer
  • Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity an
    13·1 answer
  • You are seeking a way to store computer files so you have backup copies anywhere you go.? Which one of the secondary storage typ
    11·1 answer
  • Bullet points on a slide should be limited to _____.<br><br> A. 2<br> B. 4<br> C. 8<br> D. 10
    7·1 answer
  • What is data and information
    9·1 answer
  • Why would you browse by entering a URL rather than use a link in a Web page
    15·1 answer
  • It is a kind of malware (malicious software) that criminals install on your computer so they can lock it from a remote location.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!