1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Assoli18 [71]
3 years ago
14

Which of the following best describes the protocols used on the Internet?

Computers and Technology
1 answer:
Cerrena [4.2K]3 years ago
3 0

Answer: No it is D.

D: The protocols of the Internet are open and used by all devices connected to the network

Explanation:

There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly.  There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.

You might be interested in
What is the difference in adware and spyware
Katarina [22]

Generally speaking, adware is a program that installs an additional component that feeds advertising to your computer, often by delivering pop-up ads or by installing a toolbar in your browser.

Some adware may hijack your browser start or search pages, redirecting you to sites other than intended. Unless you're a fan of guerrilla marketing, such tactics can be annoying. Worse, the mechanism that feeds the advertising can introduce system anomalies or incompatibilities that cause problems with other programs and can even disrupt the functioning of the operating system.

Spyware surreptitiously monitors your computer and internet use. Some of the worst examples of spyware include keyloggers who record keystrokes or screenshots, sending them to remote attackers who hope to glean user IDs, passwords, credit card numbers, and other sensitive information.

Most often, though, spyware takes a more benign but still quite offensive form. The information gathered, often referred to as "traffic data," can consist of monitoring the websites visited, ads clicked, and time spent on certain sites. But even in its more benign form, the collected data can morph into something far more insidious.

Hope this helped.. ;D

3 0
3 years ago
Read 2 more answers
You are writing a program using the Java language. Which of the following is a requirement of Java syntax?
miv72 [106K]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

"D" option is correct

           "Each statement needs to end in a semicolon."

semicolon must use in program.without semicolon program doesn't accept.so each statement needs to end in a semicolon.

4 0
3 years ago
Enables businesses and consumers to share data or use software applications directly from a remote server over the Internet or w
Sindrei [870]

Answer:

Cloud Computing        

Explanation:

Cloud Computing is basically an infrastructure to deliver various computing resources and services  to the users online (via Internet). These resources include networks, applications, servers, databases, software, storage etc.

These services are mostly utilized by organizations for recovery and backup of data, using virtual hardware and other computing resources such as desktops, memory etc. Cloud computing is also used for developing software, for securing data by providing with access control and for storing bulk of data.

The benefits of cloud computing are as following:

Because of cloud computing the customers do not have to buy hardware or install software on their computer which might be very costly to maintain and update. Servers and data centers are provided by cloud service providers and experts are available for managing the services and resources.

These services are scalable and can be adjusted as per the users requirements.

Cloud computing offers a variety of protocols, tools, and access controls that improve security and protects confidential data, applications, and networks against security threats and attacks. It also provides with data backup, disaster recovery.

5 0
3 years ago
What do rocket scientists mean when they say, "forces come in pairs?"
zhenek [66]
According to Newton's third law, for every action force there is an equal (in size) and opposite (in direction) reaction force.
6 0
3 years ago
Html quickly evolved through specifications that are the result of the collective work of the organization known as the ____.
Archy [21]

Html quickly developed thanks to specifications that came up as a result of the World Wide Web Consortium's joint work (W3C).

<h3>What is world wide web consortium (W3C)?</h3>
  • The main worldwide standards body for the World Wide Web is the World Wide Web Consortium.
  • The consortium, which was established in 1994 and is now chaired by Tim Berners-Lee, is made up of member organizations that employ full-time workers to collaborate on developing standards for the World Wide Web.
  • In order to create Web standards, member organizations, a full-time staff, and the general public collaborate inside the World Wide Web Consortium (W3C).
  • W3C's goal is to lead the Web under the direction of Web creator and Director Tim Berners-Lee and CEO Jeffrey Jaffe.

To learn more about world wide web consortium (W3C), refer to:

brainly.com/question/11397745

#SPJ4

7 0
2 years ago
Other questions:
  • The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of d
    7·2 answers
  • When using static ip addressing, software automatically configures the network connection on each device.?
    9·1 answer
  • Would you recommend the 4a generations of computers to a friend
    5·1 answer
  • Which of the following plug-ins was developed by microsoft and is a software development tool used to write and run internet app
    10·1 answer
  • How does knowing the player type you are impact your game designing?
    6·1 answer
  • Which of the following is considered a basic task in the context of computer operations? a. Connecting to the Internet b. Natura
    6·1 answer
  • You are installing a single 802.11g wireless network. The office space is large enough that you need three WAPs. What channels s
    10·1 answer
  • How to identify mistakes in a html code??​
    14·1 answer
  • c) If you are at foreign country visit, which banking card would you prefer to keep with you during visit (Debit Card or Credit
    10·1 answer
  • In the Business world people are often measured by their???
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!