1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Westkost [7]
4 years ago
13

The set of rules for how computers talk to one another is called

Computers and Technology
1 answer:
Igoryamba4 years ago
3 0
<span>The set of rules for how computers talk to one another is called: PROTOCOL. </span>
You might be interested in
This week you will learn about basic code structure. The term structure, as it relates to programming, refers to the decisions y
GenaCL600 [577]
Instead of having to write multiple pieces of code for different outcomes, you can use an elseif statement and make your code easier to read and easier to understand.
8 0
4 years ago
How do computers perform complicated tasks built from simple instructions?
wlad13 [49]
They use and perform a set of actions and programs that build on each other.
8 0
4 years ago
Which step of creating a financial budget involves listing the payroll, rental, and utility costs?
Bingel [31]

Answer:

A. planning and gathering financial information

4 0
4 years ago
Read 2 more answers
To add color to the entire background of a page, users will select the ___ feature?
puteri [66]
The Fill color tab. Hope this helps!
5 0
3 years ago
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
2 years ago
Read 2 more answers
Other questions:
  • Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply loo
    14·1 answer
  • Ascending and descending are examples of
    5·2 answers
  • Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
    7·2 answers
  • Which ergonomic principle helps to maintain good posture?
    7·2 answers
  • "what type of index has an index key value that points to a data row, which contains the key value? "
    9·1 answer
  • A member function of a derived class may not have the same name as a member function of a base class
    9·1 answer
  • What is a Stereo In (&amp; Out) in audio?
    7·1 answer
  • According to the textbook, the definition of transition is
    13·1 answer
  • Python program oranges and apples 3.4.6 copy and paste would be nice
    7·1 answer
  • 1. The running configuration is also known as the _____________ (Select Two) a. Startup config b. Working configuration c. Curre
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!