1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KATRIN_1 [288]
3 years ago
7

Which of the following best describes the protocols used on the Internet?

Computers and Technology
1 answer:
max2010maxim [7]3 years ago
5 0

Answer:

D: The protocols of the Internet are open and used by all devices connected to the network

Explanation:

There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly.  There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.

You might be interested in
Someone please help! Please fill this out
solmaris [256]
A Would be the answer, Sir.!
5 0
3 years ago
"what is the name of the ipsec configuration file"
kifflom [539]
Ipsec.conf file. This file is found in the /etc/ directory
5 0
3 years ago
What type of device is the printer?
ICE Princess25 [194]

B,the printer only receives signals from the computer and prints them.

4 0
3 years ago
Read 2 more answers
The ? contains software routines that developers use to create a consistent computer environment
Luba_88 [7]

The toolbox contains software routines that developers use to create a consistent computer environment.

3 0
3 years ago
Read 2 more answers
Four workers take an extra half-hour for lunch, at a cost of $14/ hour
Usimov [2.4K]

Answer:

whats the rest ?

Explanation:

whats the rest ?

8 0
3 years ago
Other questions:
  • Write a statement that reads 5 successive integers into these variables that have already been declared : x1 x2x3x4 x5. Then wri
    7·1 answer
  • Jeffrey works with a huge database of spreadsheet records each day. To organize and identify these spreadsheets, he wants to ass
    7·2 answers
  • The 7-bit ASCII code for the character ‘&’ is: 0100110 An odd parity check bit is now added to this code so 8 bits are trans
    12·1 answer
  • If you use the assign software to a user option, how does the new software install to the user's computer? 70-411
    10·1 answer
  • __________ are the first line of defense against unsafe drivers.
    5·1 answer
  • You want to use a terminal program to terminal into a cisco router. what protocol should i use
    8·1 answer
  • Please help me with this coding problem :)
    6·1 answer
  • What is one disadvantage people face without a checking account?
    12·1 answer
  • In this exercise, you'll raise a manual exception when a condition is not met in a particular function. In particular, we'll be
    10·1 answer
  • Which discipline focuses on the design of computer hardware?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!