1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
const2013 [10]
3 years ago
8

Layer 3 of the Transmission Control Protocol/Internet Protocol (TCP/IP) is called the Internet Layer. Describe the functions of

this layer.
Computers and Technology
1 answer:
attashe74 [19]3 years ago
7 0

Answer: Internet layer in TCP/IP stack is used for the transmitting and exchanging of information or message between the source and destination in computer systems.The main functions performed by this layer are as follows:-

  • It  transfers the message to the network interface layer
  • The correct information route and destination is established
  • Prefers intelligent routing technique by choosing the shortest route among all paths
  • If any error case of transmission arises then another alternate path for datagram transmission is used.

You might be interested in
Write down eight points on how modern technology have effected our life ?
luda_lava [24]

Answer:

  1. Made everyday activities easy to do
  2. We have become dependant on mordern technology
  3. We use the internet for everything
  4. Meetings can be done online
  5. food can be ordered and delivered online
  6. Payments can be done using technology
  7. We pay more attention to social media
  8. Meet new people online
3 0
3 years ago
Big data are used to _____. Select 3 options.
jeka57 [31]

Answer:

AI, Interests, and marketing

Explanation:

Processing privacy policies is not a real function of a large data set.

8 0
3 years ago
In which utility is the file search option found in windows
OLEGan [10]

Press Windows logo key + X Key.

Click on Control Panel.

Double Click on Troubleshooting.

Click on View all option, on left hand side of the window.

Click on Search and indexing and follow the on screen instructions.

5 0
3 years ago
Why is monitoring email, voice mail, and computer files considered legal?
Sati [7]

Explanation:

Monitoring someone's emails,voice mails and computer files is considered is illegal because you are accessing someone's personal information which is not regarded as  ethical .

There are certain reasons where one's email,voice mails and computer files can be monitored are as following:

  1. Protect the security information and security.
  2. Investigation of complaints of harassment.
  3. Preventing personal use of employer's facilities.
6 0
3 years ago
Which file extension indicates the file is a Microsoft Word document?
Ivan

the answer to your question is ".docs"

3 0
3 years ago
Other questions:
  • I NEED IT FOR TODAY FOR KEYBOARDING TEST! GIVE ME CORRECT ANSWER PLZ!
    12·2 answers
  • Write the code for invoking a method named sendsignal. there are no arguments for this method . assume that sendsignal is define
    12·1 answer
  • In a five-choice multiple-choice test, which letter is most often the correct
    10·2 answers
  • The__________is an HTML tag that provides information on the keywords that represent the contents of a Web page.
    14·1 answer
  • Define input hardware​
    12·1 answer
  • What accesses organizational databases that track similar issues or questions and automatically generate the details to the repr
    14·1 answer
  • How would you delete a slide from your presentation after selecting it?
    14·1 answer
  • What is the difference between an html opening tag and a closing tag?.
    7·1 answer
  • A system engineer enhances the security of a network by adding firewalls to both the external network and the internal company n
    11·1 answer
  • Write an SQL statement to display for every restaurant the name of the restaurant (where the name of the restaurant consists of
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!