1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
docker41 [41]
3 years ago
8

Select the correct answer.

Computers and Technology
2 answers:
Gwar [14]3 years ago
4 0

Answer:

The correct answer would be B, Set of Rules.

Explanation:

In simple words, a Protocol can be defined as a set of Rules.

In computer networking terms, a protocol is a set of predefined rules and regulations, procedures and formats, which govern the communication between the different devices over a network. Protocols ensure the timely and secure communication between devices.

There are many different types of protocols. Some of the common protocols are FTP, HTTP, USENET, etc. Each of them has their own set of procedures and formats.

krok68 [10]3 years ago
4 0

It’s b

Explanation:

that’s the answer

You might be interested in
A researcher plans to identify each participant in a certain medical experiment with a code consisting of either a single letter
trapecia [35]

Answer:

5 Letters

Explanation:

So we need 12 distinct codes made of a single letter or a pair of letters.

What would be the least number of letters?

Lets try with 3 letters A, B and C

The possible combinations are: A, B, C, AB, AC, BC

These are 6 codes and we need 12 so lets try more A, B, C and D

The possible combinations are: A, B, C, D, AB, AC, AD, BC, BD, CD

These are 10 codes and we need 12 so lets try more A, B, C, D and E

The possible combinations are:

A, B, C, D, E, AB, AC, AD, AE, BC, BD, BE, CD, CE, DE

Finally we got 15 distinct codes which are more than 12 so the least number of letters needed are 5.

Using formula:

Four letters = 4C1 + 4C2 = 4 + 6 = 10

Five letters = 5C1 + 5C2 = 5 + 10 = 15

5 0
3 years ago
The view that perceptual processes take place over time and can be thought of in terms of a software/hardware metaphor is known
Wittaler [7]

The view that perpetual processes can be thought of in terms of a software/hardware metaphor is known as the: information processing view.

<h3>What is the Information Processing View?</h3>

Information processing view is explained by the cognitive theory to explain how the brain encodes information and how information are filtered from what we pay attention to in a particular moment. This also determines what is stored in the short-term or in our long-term memory.

Therefore, the view that perpetual processes can be thought of in terms of a software/hardware metaphor is known as the: information processing view.

Learn more about the information processing view on:

brainly.com/question/24863946

3 0
2 years ago
This process can be applied to help workers choose the best telecommunications technology to do a specific task.
Lisa [10]
B. Internet Telephony would be my best guess. I'm not that good with computers. Hope this Helps :-)
4 0
3 years ago
Read 2 more answers
A photo's color intensity can be modified by changing the brightness and content.
fiasKO [112]
The above statement is FALSE.

A photo's color intensity can be modified by changing the brightness and CONTRAST.

There are four common image controls that makes an image easy to view. These controls are brightness, contrast, saturation, and sharpness.

Brightness control simply brightens the whole image from the shadows to the highlights equally.

Contrast control is the separation between the darkest and brightest areas  of the image.

Saturation control is the separation of colors in the image.

Sharpness control is defined as the edge contrast, meaning the edges in the image are the ones being contrasted.
6 0
3 years ago
This method is employed in order to rapidly change the locations of the website in order to ensure that no one site us used long
tester [92]

Answer:

Fast-flux

Explanation:

The techniques that is used to shift the network without shutdown of website.

4 0
4 years ago
Other questions:
  • Give an example of an input device, an output device, a storage device, and a networking device.
    10·1 answer
  • Which of the following are types of home internet service? Check all that apply
    7·1 answer
  • A ____________ is a network connection that typically carries encrypted data over the Internet to and from a remote access serve
    13·1 answer
  • Suppose a host has a 1-MB file that is to be sent to another host. The file takes 1 second of CPU time to compress 50%, or 2 sec
    12·1 answer
  • The computer mouse are used for
    15·2 answers
  • Ask the user to input an integer. Print out the next three consecutive numbers.
    12·1 answer
  • My laptop volume has got really low all of a sudden. It wasn't the best to start with but now i can barely even hear it at 100%.
    10·1 answer
  • The head of small organization wants to install a network so that all the employees of different department can share various re
    14·1 answer
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • Which type of shape allows you to add text that can be moved around.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!