1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgen [1.6K]
4 years ago
13

The most important protocol at the internet layer is ____.

Computers and Technology
1 answer:
torisob [31]4 years ago
3 0
The most important protocol at the internet layer is ____

c. ip
You might be interested in
Energy/power management systems, kitchen appliances, smart televisions, baby monitors, fitness trackers, and personal health mon
boyakko [2]

Energy/power management systems, kitchen appliances, smart televisions, baby monitors, fitness trackers and personal health monitor are examples of internet of things.

What is meant by Internet of Things?

The Internet of Things (IoT) is known to be a term that connote the network of physical objects that are placed on or have sensors, software, etc.

Its involves technology that allows to add a device to an inert object such as plant electronic systems, roofs, lighting, that can measure environmental parameters, generate associated data and transmit them through a communications network.

Therefore, the Option C is correct.

Missing options "Client-server systems Servers Internet of Things None of the above"

Read more about Internet of Things

brainly.com/question/19995128

#SPJ1

THANKS

0

0.0

(0 votes)

Unlocked badge showing two hands making the shape of heart over a pink circle

Found this answer helpfu

5 0
2 years ago
Which ribbon tab is not a default in Outlook 2016's main interface?
Verizon [17]

Answer:

review

Explanation:

4 0
3 years ago
Read 2 more answers
the first thing to do when your computer gives you an error message is A restart the computer B press the F2 key C write down th
lesya692 [45]

Answer:

I think you should restart the computer

6 0
1 year ago
Write a C program to implement a command called ​displaycontent ​that takes a (text) file name as argument and display its conte
Zanzabum

Answer:

/*

Student: Hugo Meza

Date: February 15, 2019

Description: This program mimic the cat command from Linux. Checks whether the source file

has the right permissions, and then writes in the console its content.

*/

#include <stdio.h>

#include <fcntl.h>

#include <unistd.h>

#include <errno.h>

int hasPermission(char *filepath){

int returnval;

// Check file existence

returnval = access (filepath, F_OK);

if(errno == ENOENT){

printf ("%s does not exist\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n", filepath);

return 0;

}

// Check read access

returnval = access (filepath, R_OK);

if(errno == ENOENT){

printf ("%s does not have read access\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n",filepath);

return 0;

}

// Check write access

returnval = access (filepath, W_OK);

if(errno == ENOENT){

printf ("%s does not have read access\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n",filepath);

return 0;

}

return 1;

}

int main(int argc, char* argv[]){

if(!argv[1]){

printf("Error. Specify file to open\n");

return 0;

}

int fd;

char *fp = argv[1], content[fd];

if(hasPermission(fp) == 0)

return 1;

fd = open(fp, O_RDONLY);

int bytes = read(fd,content,sizeof(content)-1);

write(1, content, bytes);

close(fd);

return 0;

}

Explanation:

7 0
3 years ago
Phishing is a broad term that describes any program that is designed to cause harm or transmit information to others without the
katrin [286]
False phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
6 0
4 years ago
Other questions:
  • An employee who interacts with customers regarding the nature of their car problems, rather than actually working on the vehicle
    6·1 answer
  • Wyjaśnij w kontekście bezpieczeństwa, dlaczego wykonanie przelewu bankowego nie w każdej sytuacji wymaga zastosowania kwalifikow
    12·1 answer
  • Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty de
    9·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • Distinguish between secondary storage device and primary storage device
    7·1 answer
  • A firm uses BitLocker for volume encryption. Normally, BitLocker performs its task well. However, an administrator was recently
    6·1 answer
  • __ allow(s) users with mobility issues to control the computer with their voice.
    6·2 answers
  • Which of the following screen elements is a horizontal bar that displays at the
    8·1 answer
  • A falsh movies consist of how many frame? ​
    12·2 answers
  • Write a C++ program to print name, age, class, school​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!