1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxandr [17]
3 years ago
11

If you ping a device, you are using the______protocol

Computers and Technology
1 answer:
meriva3 years ago
6 0
Joystick..................:-)
You might be interested in
True or false? Resistors regulate and limit electrical current. A. True B. False
Vikki [24]
Hello! I believe the answer for this is "True"!
3 0
3 years ago
Read 2 more answers
When a user utilizes another computer to communicate with a third party, with the result that the third party cannot recognize t
avanturin [10]

Answer:

Online or Web Proxy

Explanation:

Web or online proxy allows you to hide your Internet Protocol (IP) address from the website you are trying to visit or access. It is like a shield between the website you are accessing and you. They can be seen as a middleman between you and the site you are visiting and as such, the site sees that a specific IP address is accessing its server but the address is not yours as all requests between your computer and the web server are first passed through the proxy server.

<em>Hope this helps!</em>

4 0
3 years ago
A person who is skilled at performing calculations, has math skills for advanced analysis, and has organizational skills would b
Harman [31]
A mathematician because of all their skills they have they suit the job
3 0
3 years ago
Read 2 more answers
Alexis received paychecks from both her jobs and she would like to deposit them. One check is for $62.88 and the other is $523.2
Karolina [17]

Answer:

something :}

Explanation:

have a good day

8 0
2 years ago
A truth table with three inputs has how many switch combinations?
Pie
Three inputs have 8 possible states.
Here they are:

0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1

7 0
3 years ago
Other questions:
  • Please draw a diagram of a complete graph with 5 vertices (K5), its adjacency matrix and adjacency list representations.
    13·1 answer
  • A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s
    12·1 answer
  • How to do pseudocode and flowchart in BMI ( computer programming ​
    11·1 answer
  • An organization is building a new customer services team, and the manager needs to keep the tream focused on customer issues and
    13·1 answer
  • Write a program that does the following:
    11·1 answer
  • A musical time measurer is a(an)
    10·1 answer
  • When power is completely removed from your computer
    11·1 answer
  • Consider the following code segments that are potential replacements for /* missing code */.
    6·1 answer
  • Microprocessor is what​
    14·1 answer
  • Cara is cleaning her computer when she notices a loose cable connecting to her printer. Which two ports would the cable most lik
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!