1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nata [24]
4 years ago
8

A defined set of standards that computers must follow in order to communicate properly is known as a

Computers and Technology
2 answers:
finlep [7]4 years ago
7 0

Answer: Protocol/Communication Protocol

Explanation:

  • According to computer field, communication protocol is defined as set of rules for carrying out and maintaining communication between computer devices.
  • Communication protocols helps in transmitting the message from one device to another so that communication can take place by device identification and connection.
  • The format used for communication is based on already defined for rules for sending data packets, transferring files, exchanging messages etc
  • Different types of communication protocols used for exchanging messages in computer field are TCP(Transmission control protocol) , IP(Internet protocol), FTP(File transfer protocol) etc .
muminat4 years ago
5 0
A defined set of standards that computers must follow in order to communicate properly is known as a communication protocol. The communication protocol is a <span>preexisting agreement that enables computers to exchange information. It defines  how the information will be structured and how each side will send the information. </span>
You might be interested in
The function below takes a single string parameter: sentence. Complete the function to return a list of strings indicating which
Katena32 [7]

Answer:

import java.util.*;

public class num3 {

   public static void main(String[] args) {

   String sentence = "All good people";

       System.out.println("The vowels in the sentence are ");

       returnVowels(sentence);

   }

   public static void returnVowels(String word){

       String newWord = word.toLowerCase();

       String vowels ="";

       for (int i = 0; i < newWord.length(); i++){

           if(newWord.charAt(i)=='a'||newWord.charAt(i)=='e'||newWord.charAt(i)==i||

           newWord.charAt(i)=='o'||newWord.charAt(i)=='u'){

               vowels = vowels+newWord.charAt(i);

               //System.out.print(newWord.charAt(i)+" ");

           }

       }

     

       String [] chars = vowels.split("");

       Set<String> uniqueVowels = new LinkedHashSet<>();

       for (String s : chars) {

           uniqueVowels.add(s);

       }

       System.out.println(uniqueVowels);

   }

}

Explanation:

In Java

Create the method/function to receive a string as argument

Change the string to all small letters using the toLowerMethod

Iterate through the string using if statement identify the vowels and store in a new String

Since the sentence does not contain unique vowel characters, use the set collections in java to extract the unique vowels and print out

7 0
3 years ago
Alex is setting up a network for his company's computers. He installs a circuit board into each computer, enabling it to be conn
Nitella [24]
If it's an ethernet network:  <span>network interface card</span>
6 0
3 years ago
Mecanismo que permite conocer si la persona que esta ingresando a un sistema es realmente quien deba y no un intruso
Tems11 [23]

Answer:

Sistemas de autenticación y seguridad de la información.

Explicación:

La seguridad de la información es un mecanismo que permite saber si la persona que está ingresando a un sistema es realmente quien debería y no un intruso. La seguridad de la información básicamente ayuda a prevenir el acceso no autorizado y permite que la única persona autorizada ingrese al sistema. Los sistemas de autenticación son el mecanismo de seguridad que se utiliza para proteger los datos y los sistemas. Estos sistemas de autenticación también ayudan a garantizar que los usuarios sean la persona autorizada o no.

4 0
3 years ago
The methods of the Character class that begin with ____ return a character that has been converted to the stated format.
Pavel [41]

Answer:

most probably the answer is 'to'

6 0
3 years ago
Fill in the blank with the correct response.<br> A _<br> is an unknown network.
alexgriva [62]

Answer:

ip address

Explanation:

please mark brainliest

7 0
3 years ago
Other questions:
  • A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac
    11·2 answers
  • Match each of the following terms to its function:_________
    13·1 answer
  • How to highlight text on a kindle paperwhite?
    7·1 answer
  • Television has greatly influenced how politicians are perceived via the sound bite and ________ campaigning.
    11·1 answer
  • _______________ is the term for the convergence of real-time and non-real-time communications services such as telephony, instan
    11·1 answer
  • A Homecoming Crossword Puzzle
    12·1 answer
  • Write a statement to add the key Tesla with value USA to car_makers. Modify the car maker of Fiat to Italy. Sample output for th
    13·1 answer
  • Banks will pay you interest on your money based on the interest rate. True or false?​
    11·1 answer
  • Please help!!! I am very confused about this question!
    10·1 answer
  • You must configure a certificate authority on your network to use EFS. True or False?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!