1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gekata [30.6K]
3 years ago
14

What identifies available computers through the internet?

Computers and Technology
1 answer:
olga_2 [115]3 years ago
3 0
Using a network connection, including connecting to the Internet<span>, computers connect to each other to transmit data between them and communicate with each other using the </span>TCP/IP (Transmission Control Protocol / Internet Protocol)<span>. Think of TCP/IP as a book of rules, a step-by-step guide that each computer uses to know how to talk to another computer. This book of rules dictates what each computer must do to transmit data, when to transmit data, how to transmit that data. It also states how to receive data in the same manner. If the rules are not followed, the computer will not be able to connect to another computer, nor send and receive data between other computers.</span>
You might be interested in
How many pieces are there in a normal laptop??? Good luck and solve carefully
polet [3.4K]

What do you mean pieces? Like Laptop components? If so then motherboard,ram,cpu, and psu for a basic laptop so 4 I guess (5 if you want to include a gpu).

4 0
3 years ago
In NumPy, the_______
Nikolay [14]

Numpy is among the most prevalent science computer science bundles in Python, and the following are the discussion on the use of transpose function:

  • Transpose() is among the most important <em>matrix multiplication functions</em>.
  • It is used to changes elements of the <em><u>row into column</u></em> elements and the elements of the <em><u>column into rows</u></em> elements.
  • The output of this function is an original modified array.

Therefore, the transpose function in NumPy is being used to <em><u>switch positions of rows to columns or columns to rows</u></em>.

Learn more:

brainly.com/question/24763535

7 0
2 years ago
An internal conflict is generally harder to write and still harder to convey in an interactive computer game
Tanya [424]
True, because of how the human mind works, you could have a fairly hard decision that could affect your life. So, An Internal conflict is more difficult to convey in an interactive computer game.
7 0
3 years ago
The roll out, roll in variant of swapping is used ____."
Sindrei [870]

Answer:

C.) for priority-based scheduling algorithms

Explanation:

for priority-based scheduling algorithms

4 0
3 years ago
Which of the following protects against cave-ins? A. All answer choices protect against cave-ins B. Shielding C. Shoring D. Slop
babunello [35]
I think it is b idk if it is 100% right
4 0
3 years ago
Read 2 more answers
Other questions:
  • Which protocol is used by the client for microsoft networks and file and printer sharing for microsoft networks to communicate w
    10·1 answer
  • Tiffany is an instructor at a college that is run on student tuition and not state taxes. Which statement best describes her emp
    6·2 answers
  • Describe how to manipulate artwork in a presentation.
    13·1 answer
  • Why a management-focused program provides a more appropriate learning path for you than a program based heavily on technical con
    8·1 answer
  • If you’re paid hourly and work 40 hours in one week how much overtime have you worked? 8 hours none $48 or $80
    9·2 answers
  • What are some of the ways we can resolve IPv4 address shortages? Check all that apply.
    13·1 answer
  • Consider the following code: def tryIt(b): for i in range(len(b)): b[i] = b[i] + 100 #***********MAIN************ x = [] x = [56
    8·1 answer
  • !!!!!16 POINTS!!!!Can a computer evaluate an expression to something between true and false? Can you write an expression to deal
    7·1 answer
  • What influences my school my church and my leader on my society​
    8·1 answer
  • What to do if you click on a phishing link on iphone
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!