1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
docker41 [41]
3 years ago
8

Select the correct answer.

Computers and Technology
2 answers:
Gwar [14]3 years ago
4 0

Answer:

The correct answer would be B, Set of Rules.

Explanation:

In simple words, a Protocol can be defined as a set of Rules.

In computer networking terms, a protocol is a set of predefined rules and regulations, procedures and formats, which govern the communication between the different devices over a network. Protocols ensure the timely and secure communication between devices.

There are many different types of protocols. Some of the common protocols are FTP, HTTP, USENET, etc. Each of them has their own set of procedures and formats.

krok68 [10]3 years ago
4 0

It’s b

Explanation:

that’s the answer

You might be interested in
3. A security system uses sensors at every door and window which will set off analarm if any one of them is opened. There is als
sp2606 [1]
A combination circuit would be needed for security because if you had a strait circuit if any one of those sensors or the keypad was ripped off the circuit will now let the flow of electricity be possible but with a combination circuit it helps eliminate that problem because even if on flow path is cut off, other paths are still available <span />
6 0
3 years ago
Select the correct statement(s) regarding partial mesh networks.
sweet [91]

Answer: all the answers are correct

Explanation:

Partial mesh networks is simply a packet switching networks which is connected and require that there should be establishment of a circuit before the exchange of packets.

Partial mesh networks are less expensive to implement when they're being compared to the full mesh networks and are also less redundant.

The correct statements regarding partial mesh networks are:

•the number of links connecting nodes in a partial mesh network depends upon the availability and reliability requirements of the network

• switches play an integral role in a partial mesh network, where several paths through the network are available

• redundant links and switches are used to improve the availability and reliability of partial mesh networks

6 0
3 years ago
Sending a busy manager a long email represents a problem in which area of the communication process
FromTheMoon [43]
Time management,they wouldn’t have enough time to read it and they would become more stressed out
3 0
3 years ago
What's the difference between kilobyte and kibibyte, and why was the IEC convention for computer international memories made???
Masja [62]

Answer:

The Kibibyte was developed to take place of the kilobytes in the computer science context where the Kilobyte stands for 1024 bytes. And the Kilobyte interpretation to mean 1024 bytes, conflicts the Standard definition of the prefix kilo or 1000. And the IEC convention for computer international memories was made to define the international standards for electrical, electronic and related technologies.

Explanation:

Please check the answer section.

8 0
3 years ago
List the five ethical rules that you feel are most important for one to follow when using the internet.
seropon [69]
1. Be smart
2. Do not tell anyone your personal info
3. Use reliable resources while looking up things (org,net,ect. no .coms)
4. ask your parents or guardian if you can go on a specific website And number 5 have fun!
7 0
3 years ago
Other questions:
  • Which of the following is NOT one of the most important elements when designing a website?
    8·2 answers
  • Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an un
    13·1 answer
  • Consider a hypothetical microprocessor generating 16-bit addresses with 16-bit data accesses (i.e. each access retrieves 16 bits
    9·1 answer
  • Design an algorithm for a bounded-buffer monitor in which the buffers (portions) are embedded within the monitor itself."
    10·1 answer
  • When you catch an Exception object, you can call ____ to display a list of methods in the call stack so you can determine the lo
    6·1 answer
  • Each tab is divided into groups of related commands or buttons. T or F
    10·1 answer
  • A large population of ALOHA users manages to generate 50 requests/sec, including both originals and retransmissions. Time is slo
    5·1 answer
  • What sort of query is (strbucks]?
    14·1 answer
  • Write an application that inputs a five digit integer (The number must be entered only as ONE input) and separates the number in
    10·1 answer
  • You can't cite Wikipedia, what are three ways that you can use it for your research?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!