1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
docker41 [41]
3 years ago
8

Select the correct answer.

Computers and Technology
2 answers:
Gwar [14]3 years ago
4 0

Answer:

The correct answer would be B, Set of Rules.

Explanation:

In simple words, a Protocol can be defined as a set of Rules.

In computer networking terms, a protocol is a set of predefined rules and regulations, procedures and formats, which govern the communication between the different devices over a network. Protocols ensure the timely and secure communication between devices.

There are many different types of protocols. Some of the common protocols are FTP, HTTP, USENET, etc. Each of them has their own set of procedures and formats.

krok68 [10]3 years ago
4 0

It’s b

Explanation:

that’s the answer

You might be interested in
A computer on a network that is not the server​
katrin [286]

Answer:

A peer-to-peer network is one in which two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software. ... A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files.

5 0
3 years ago
listen to exam instructions a small business called widgets, inc. has hired you to evaluate their wireless network security prac
Alex

Following actions could you most likely advise the client taking to strengthen the security of their wireless network-

  • Change the default SSID to anything different.
  • Turn off SSID broadcasting.
<h3>Explain the term wireless network security?</h3>
  • Designing, putting into practice, and ensuring security on such a wireless computer network are all parts of wireless network security.
  • A wireless computer network is further protected by this subset of network security.
  • Wireless security is another name for wireless network security.

For the stated question-

  • Disabling SSID broadcast and changing the network name are advised.
  • By disabling SSID, the network name won't be displayed on devices looking for a network can connect to, and so by changing the name, it will be impossible for anyone who already knows the old name to connect.
  • Both of which significantly boost security.

To know more about the wireless network security, here

brainly.com/question/28257213

#SPJ4

3 0
1 year ago
What is data mining ​
Vesna [10]

Answer:

Data mining is a process of extracting and discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.

5 0
3 years ago
Read 2 more answers
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward t
stepladder [879]

Answer:

Repeaters

Explanation:

As the question points out, the signal strength diminishes (attenuates) as it travels farther from the source.  Deploying a repeater at critical points throughout the building would boost the signal strength as it continues on its way.

5 0
2 years ago
Convert decimal number 262 to an octal number.
liberstina [14]

Answer:

406.

Explanation:

continuously dividing the base 10 or decimal number by 8 till the decimal number does not becomes zero and the result is the remainders in reverse.  

Remainder on 262 / 8 = 6.  

Remainder on 32 / 8 = 0.  

Remainder on 4 / 8 = 4.  

Octal number=406.

8 0
3 years ago
Other questions:
  • Why ois my printer not printing pictjures?
    9·1 answer
  • When you tell a computer what to do, you are providing input?
    11·1 answer
  • Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform onl
    11·1 answer
  • The idea generating technique most often used in writing business letter is ?
    9·2 answers
  • A user reports that he cleared a paper jam and now cannot print. The technician reseats the paper and then prints a test page fr
    14·1 answer
  • How to fix a light blub
    11·2 answers
  • Why did Elena Gilbert Turn her humanity off when she was sired to Damon? (In The Vampire Diaries)
    14·1 answer
  • Write a pseudocode that receives a positive number from the user, and then,
    14·1 answer
  • A Python file that contains variables and functions and can be used in other programs is called a
    5·1 answer
  • What is the main coding language for netflix?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!