1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
docker41 [41]
3 years ago
8

Select the correct answer.

Computers and Technology
2 answers:
Gwar [14]3 years ago
4 0

Answer:

The correct answer would be B, Set of Rules.

Explanation:

In simple words, a Protocol can be defined as a set of Rules.

In computer networking terms, a protocol is a set of predefined rules and regulations, procedures and formats, which govern the communication between the different devices over a network. Protocols ensure the timely and secure communication between devices.

There are many different types of protocols. Some of the common protocols are FTP, HTTP, USENET, etc. Each of them has their own set of procedures and formats.

krok68 [10]3 years ago
4 0

It’s b

Explanation:

that’s the answer

You might be interested in
Publishing is copying Web pages and associated files to a Web<br> server. T or f
sineoko [7]
The answer would be true.
4 0
3 years ago
Write a loop that asks the user to enter a number. the loop should iterate 10 times and keep a running total of the numbers ente
Blababa [14]
int sum = 0;
int number;
for (int i=0; i<10; i++) { 
   printf("Enter an integer number: ");
   scanf_s("%d", &number);
   sum += number;
}

printf("The sum is %d", sum);

6 0
3 years ago
Develop a CPP program to test is an array conforms heap ordered binary tree. This program read data from cin (console) and gives
mafiozo [28]

Answer:

Following are the code to this question:

#include<iostream>//import header file

using namespace std;

int main()//defining main method

{

int ar[7];//defining 1_D array that stores value      

int i,x=0,l1=1,j; //defining integer variable

for(i=0;i<7;i++)//defining for loop for input value from user ends  

{

cout<<"Enter a Number: ";//print message

cin>>ar[i];//input value in array

if(l1<=2 && i>0)//using if block that checks the array values  

{

x++;//increment the value of x by 1  

}

if(l1>2 && i>0)//using if block that checks the array values  

{

l1=l1-2;//using l1 variable that decrases the l1 value by 2  

}

j=i-x;//using j variable that holds the index of the root of the subtree

if(i>0 && ar[j]>ar[i])// use if block that checks heap condition  

{

l1++; //increment the value of l1 variable

}

if(i>0 && ar[j]<ar[i])// using the if block that violate the heap rule  

{

cout<<ar[i]<<" "<<"Violate the heap";//print message with value

break;//using break keyword  

}

}

return 0;

}

Output:

1)

Enter a Number: -15

Enter a Number: -5

-5 Violate the heap

2)

Enter a Number: 45

Enter a Number: 0

Enter a Number: 55

55 Violate the heap

Explanation:

  • In the above-given C++ language code, an array "ar" and other integer variables " i,x,l1, j" is declared, in which "i" variable used in the loop for input values from the user end.
  • In this loop two, if block is defined, that checks the array values and in the first, if the block it will increment the value of x, and in the second if the block, it will decrease the l1 value by 2.
  • In the next step, j variable is used that is the index of the root of the subtree. In the next step, another if block is used, that checks heap condition, that increment the value of l1 variable. In the, if block it violate the heap rule and print its values.
5 0
3 years ago
Renting provides _________ flexibility but can lead to _________ costs in the long-term.
docker41 [41]
Renting provides greater flexibility but can lead to higher costs in the long term.
3 0
3 years ago
Read 2 more answers
Mark’s friends told him about an automated program that sends unsolicited messages to multiple users. Which type of program were
Phantasy [73]
Spambots send thousands of messages world wide once they get your information things like email and such and send out unsolicited things out constantly. Brainliest??
5 0
3 years ago
Read 2 more answers
Other questions:
  • If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
    11·1 answer
  • MegaCorp MegaCorp is large manufacturing firm that operates 5 factories in Dallas, 4 factories in Los Angeles, and 5 factories i
    13·1 answer
  • A teacher wants to create a list of students in her class. Using the existing Student class in this exercise. Create a static Ar
    14·1 answer
  • A workstation with a static IP (Internet Protocol) address can print and authenticate to a server, but cannot browse to www.comp
    14·1 answer
  • Your assignment is to write an assembly language program which read a string and print it in uppercase. This program asks the us
    11·1 answer
  • HELPPPP KOKICHI IS OUT TO KILL ME
    11·1 answer
  • The most common clefs for high notes are what?
    6·2 answers
  • Question # 5
    6·1 answer
  • A student is browsing a website. While browsing, he click on a link that takes him to another website. Which code gives the corr
    14·1 answer
  • A person's oral communication skills can give either a positive or negative first impression.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!