1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Assoli18 [71]
3 years ago
14

Which of the following best describes the protocols used on the Internet?

Computers and Technology
1 answer:
Cerrena [4.2K]3 years ago
3 0

Answer: No it is D.

D: The protocols of the Internet are open and used by all devices connected to the network

Explanation:

There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly.  There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.

You might be interested in
Wikis are designed for ________, which is allowing people to contribute more than just posting a response
Viefleur [7K]

Answer:

collabirations

Explanation

Wikis are designed for collabirations, which is allowing people to contribute more than just posting a response.

4 0
3 years ago
The inorder and preorder traversal of a binary tree are d b e a f c g and a b d e c f g, respectively. The postorder traversal o
garik1379 [7]

Answer:

Option (A)

Explanation:

In the post order traversal, we always print left subtree, then right subtree and then the root of the tree. In preorder traversal, First the root is printed, then, left subtree and at last, right subtree, so, the first element in preorder is the root of the tree and we can find elements of left sub tree from in order as all the elements written left to the root will of left subtree and similarly the right one. This is how repeating it will give the post order traversal.

3 0
3 years ago
Read 2 more answers
5 The following text is stored as a text file:
WARRIOR [948]

Lossless compression decreases file size without removing any bits of information. Instead, this format works by removing sameness within data to reduce the overall file size. With lossless, it is possible to perfectly rebuild the original file.

<h3>What utilizes lossless compression?</h3>

Lossless compression is commonly used for so-called "discrete" data, such as database records, spreadsheets, word-processing files, and even some types of image and video information. Text compression is a powerful area for lossless compression.

<h3>What is lossless compression example?</h3>

Lossless compression methods are reversible. Examples of lossless reduction include GZIP, Brotli, WebP, and PNG, Lossy compression, on the other hand, uses inexact approximations by dumping some data from the original file, making it an irreversible compression process

To learn more about Lossless compression, refer

brainly.com/question/17266589

#SPJ9

3 0
2 years ago
How should you add a appointment to your outlook calendar
klasskru [66]

answer:

press on the date thing

5 0
3 years ago
Read 2 more answers
Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________. ensuring t
bazaltina [42]

Answer: ensuring that a system is not changed by a subject that is not authorized to do so

Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion

4 0
3 years ago
Other questions:
  • ____and___ are the two major techniques involved in green computing. //help \\
    10·1 answer
  • How do you get stickman worriers
    12·1 answer
  • Evaluating how current, credible, and unbiased a source is ensures:
    7·1 answer
  • ______ is the software that prevents people from being able to access your personal information.
    8·2 answers
  • Misperceptions can lead to miscommunication. List an example from the article.(site 1)
    10·2 answers
  • ...................is a high level, structured , open source programming language​
    10·1 answer
  • When comparison shopping, all of these hint at a good deal EXCEPT_____________________.
    5·1 answer
  • What is the full form of GUI​
    10·2 answers
  • Can somebody hack ur account on Brainly bc I feel like I have bc I have answered waaaaaay more questions than shows on my profil
    13·1 answer
  • Direction: using the data at the left, answer the questions that follows.​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!