1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valkas [14]
3 years ago
15

WILL GIVE BRAINLIEST!!!

Computers and Technology
2 answers:
MAXImum [283]3 years ago
7 0

Answer:

rules for organizing data sent through a communications network

Explanation:

a set of rules or procedures for organizing and transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it.

hope this helps

Kaylis [27]3 years ago
3 0

Answer:

Rules for organizing data sent through a communications network

Explanation:

I would agree with this answer. Refer to the definition of protocol.

"the official procedure or system of rules governing affairs of state or diplomatic occasions."

Therefore that narrows it down to the last two options that deal with "rules." And the rules that check the reliability of data within a network doesn't really connect with the definition of protocol.

So the answer has to be the last option.

You might be interested in
In order to get a great sports photograph, you need to do what?
Alik [6]
The answer is Anticipate the action.  <span>In order to get a great sports photograph, you need to anticipate the action.  </span><span>A big part of </span>sports photography<span> is </span>anticipating action.  <span>The photographer will be able to anticipate the action so that the camera will be pointed in the right direction to capture the decisive moments on film</span>
8 0
4 years ago
Read 2 more answers
In which state of matter is there no particle motion?
kiruha [24]
Solid is your answer for the day
6 0
3 years ago
ASAP! WILL MARK BRAINLIEST + 100 POINTS!!<br><br> Match each word to its description.
Naily [24]

When was the Ming dynasty established?

the 1100s CE

the 1200s CE

the 1300s CE

the 1400s CE

4 0
3 years ago
Read 2 more answers
Multiple Select Which of these are ways a hacker might learn someone's password? Select 3 options. o social engineering keylogge
LUCKY_DIMON [66]

Answers:

-Social Engineering

-Dumpster Diving

-Keylogger

4 0
3 years ago
Which of the following items is the best list of items to bring to a job interview?
kykrilka [37]
I’d say the last one the other ones are just silly
5 0
3 years ago
Read 2 more answers
Other questions:
  • Universal Containers (UC) is currently live with Sales Cloud and in the process of implementing Service Cloud. UC wants to creat
    5·1 answer
  • Gunther is filling in his own input mask. He wants to format the Social Security numbers of his clients. The field must contain
    7·1 answer
  • Xavier loves to sing and hum, and he always has music softly playing while he studies. The learning style that best fits Xavier
    6·2 answers
  • You asked your colleague to provide feedback on a blog post you recently wrote. When they sent you their feedback, they made edi
    10·1 answer
  • When making an on-site service call, what should you do before making any changes to software or before taking the case cover of
    6·1 answer
  • Question 6 (2 points)
    11·1 answer
  • Write 3 differences between Virtual reality and Augmented reality
    13·2 answers
  • Bitmap images are ________ into different software applications.
    9·1 answer
  • Consider a short, 90-meter link, over which a sender can transmit at a rate of 420 bits/sec in both directions. Suppose that pac
    9·1 answer
  • The residual volume can be measured directly with: Select an answer and submit. For keyboard navigation, use the up/down arrow k
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!