1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
3 years ago
13

Someone please help me with the right answer please

Computers and Technology
1 answer:
professor190 [17]3 years ago
7 0

Answer:the second one

Explanation:

You might be interested in
Explain each of the three important concepts behind the Federal Networking Council's definition of the term Internet. Explain ho
maria [59]

Answer:

The three important concepts in the Federal Networking Council's definition of the Internet are, namely;

  • Packet switching
  • The TCP/IP communications protocol
  • Client/server computing

Explanation:

  • Packet switching involves the transfer of data which are grouped into different packets and then sent over a digital network to their respective destination. After the data are received at the destination site, they are then extracted and used by the application software.
  • The transmission control protocol/internet protocol allows one computer to connect or communicate with another one through the internet. The internet protocol defines how to route and address each packet to ensure it gets to the right destination. The IP address of a particular device on a network is usually unique to that device.
  • Client/server computing describes how a server provides services by taking requests from clients computers and sharing its resources with one or more computers.
7 0
3 years ago
Which of the following represents the biggest difference between asymmetric and symmetric cryptography?
Pavlova-9 [17]

Answer:

D

Explanation:

The basic difference between these two types of encryption is that symmetric encryption uses one key for both encryption and decryption, and the asymmetric encryption uses public key for encryption and a private key for decryption.

4 0
3 years ago
Pls help I will give points
Brrunno [24]

Answer:

Desktop

Explanation:

3 0
3 years ago
When was kale discovered?
anyanavicka [17]
Kale was discoverd just 2 years ago ........
8 0
4 years ago
Which of the following statements about wide area networks are true? Select 3 options.
Montano1993 [528]

Answer:

abd

Explanation:

connections usually occur through a public network

cool devices in a large geographic area

typically uses Ethernet and wirless routers to connect device

7 0
3 years ago
Other questions:
  • Which of the following is NOT a group on the Slide Master tab?
    6·1 answer
  • Typically, a CLEP exam is taken by students who
    8·1 answer
  • You should hand write your references on your resume.
    15·2 answers
  • A _________________________ can use SOAP headers to carry meta information in its messages. A. Web service B. REST Service C. Co
    14·1 answer
  • What are some pros for having your phone during school hours?
    10·2 answers
  • Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthe
    6·1 answer
  • ____ occurs when two nodes simultaneously check a channel, determine that it is free, and begin to transmit.
    9·1 answer
  • How did the military in the early 1900s move resources?
    7·1 answer
  • Which of the following screen elements is a horizontal bar that displays at the
    8·1 answer
  • 30 Points!!
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!