1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SashulF [63]
4 years ago
8

A network protocol is a set of rules defining communication between two devices. True False

Computers and Technology
2 answers:
Westkost [7]4 years ago
8 0

Answer:

True

Explanation:

I think I might be right or wrong idk

melamori03 [73]4 years ago
7 0
True it is a Set of rules
You might be interested in
Which access control type would you use to grant permissions based on the sensitivity of the information contained in the object
hram777 [196]

Answer:

Mandatory Access Control (MAC) is a means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (i.e., clearance) of users to access information of such sensitivity.

5 0
3 years ago
Which reports indicate how traffic arrived at a website?
umka21 [38]

Answer: All traffic reports indicate how traffic arrived at a website.

Explanation:

5 0
3 years ago
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
Fill in the code in the underlined location to display the mouse point location when the mouse is pressed in the pane. pane.setO
Svet_ta [14]

Answer:

The correct option is  pane.setOnMouseClicked((e) -> System.out.println(e.getX() + ", " + e.getY()));

Explanation:

As the complete question is not provided, the complete question is attached herewith.

In order to handle the underlined location the way is to get the position using the MouseClicked event which will be activated when the mouse is clicked and then the values of X and Y position will be printed.

pane.setOnMouseClicked((e) -> System.out.println(e.getX() + ", " + e.getY()));

The other options are not correct as the handle used in them is not defined for this purpose.

6 0
4 years ago
Julie I'm here so help me I'm red
aniked [119]

Answer:

hey hey hey hey hey hey hey hey

Explanation:

hey hey hey hey hey hey hey hey

7 0
3 years ago
Other questions:
  • Social scientists who study criminal behavior.
    7·2 answers
  • Say our confusion matrix is as follows, calculate precision, recall, and accuracy. Interpret the results for the positive class.
    10·1 answer
  • the ____ presents information about the document, the progress of current tasks, and the status of certain commands and keys.​
    14·1 answer
  • 12. Which of the following is CourseBit®? (1 point)
    6·1 answer
  • What are programming paradigms?​
    9·1 answer
  • Which role involves designing and creating advertisements for marketing purposes?
    14·1 answer
  • Use the drop-down menu to correctly identify the numbering system.
    7·1 answer
  • What makes manually cleaning data challenging?
    15·1 answer
  • In order to communicate between devices inside a computer?
    9·1 answer
  • Simple example of hybrid computer​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!