1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SashulF [63]
2 years ago
11

"The network layer is responsible for transferring packets of data from the A.Source computer to the destination computer on adj

acent networks B. Source computer to the destination computer on the same network C.Source computer to the destination computer via one of more networks D. Source computer to the Internet"
Computers and Technology
1 answer:
galben [10]2 years ago
3 0

Answer:

Source computer to the destination computer via one of more networks

Explanation:

The network layer provides the means of transferring variable-length network packets from a source to a destination host via one or more networks.

You might be interested in
Brock wants to use several images on his hiking blog. However, the images are making his pages load very slowly. Explain to Broc
attashe74 [19]
First brock has to make sure he has all the hiking gear, like a camel back, gloves, the right pair of shoes. and then if he wants to take pictures he should buy a go-pro so he doesn't really have to move will the go-pro will record or take pictures.
hope i helped 0-0 ;p
plz mark brainly
5 0
3 years ago
Which are ways action buttons can be used in presentations?
Luda [366]
You could Do Ctrl + F5 to present your google slides

You could Animate Objects/Units by one of the drop down menus in google slides

You could add a link by copying the link you want to put in by highlighting the link, pressing Ctrl + C (to copy) and Find where you would like to place it and press Ctrl + V
(To Paste)

If you press on a google slide and do not do anything else, at the top it should say theme Or background, there you could select a image from your device or a solid color or Gradient of a color for your background.
6 0
2 years ago
Read 2 more answers
Which image file format is the most widely used?
Ostrovityanka [42]

Answer: jpeg because its a lot of people use it for quaity

7 0
1 year ago
Which of the following is not a characteristic of Web 2.0?
Dmitry [639]

Answer:

c. mentorship programs taking place via the internet

Explanation:

The World Wide Web (WWW) was created by Tim Berners-Lee in 1990, which eventually gave rise to the development of Web 2.0 in 1999.

Web 2.0 can be defined as a collection of internet software programs or applications which avails the end users the ability or opportunity to share files and resources, as well as enhance collaboration over the internet.

Basically, it's an evolution from a static worldwide web to a dynamic web that enhanced social media. Some of the examples of social media platforms (web 2.0) are You-Tube, Flickr, Go-ogle maps, Go-ogle docs, Face-book, Twit-ter, Insta-gram etc.

Some of the main characteristics of Web 2.0 are;

I. Social networking.

II. Blogging.

III. Interactive comments being available on many websites.

Also, most software applications developed for Web 2.0 avails its users the ability to synchronize with handheld or mobile devices such as smartphones.

However, mentorship programs taking place via the internet is not a characteristic of Web 2.0 but that of Web 3.0 (e-mentoring).

7 0
2 years ago
Develetech has a security policy that mandates a basic security feature for mobile device access. What is this basic security fe
kirill [66]

Answer:A password or a PIN

Explanation: Develetech is a industry that has the a internet page and can also be used in the mobile devices. There is particular authorization that the organization provides to an individual user for accessing of the services to maintain the security .The security is maintained by providing the devices with an encrypted text that is known as the password. The user has to enter the pin or password to execute the service on device.

5 0
3 years ago
Other questions:
  • Which of these statements regarding mobile games is true? A. They are typically played indoors. B. They have detailed environmen
    7·1 answer
  • ​A(n) ____ will hold an online auction buyer’s payment until he or she is satisfied that the item bought matches the seller’s de
    13·1 answer
  • Part cost Calculator Modify the GUI in your program to look like the following GUI. To do that you need to add the following to
    13·1 answer
  • Which of these is NOT one of the three parts to the event-handling mechanism in Java?
    10·1 answer
  • When planning the structure of a spreadsheet, columns are for _______ items and rows are for _______ items.
    10·2 answers
  • 6. The following is a dump of a DATA chunk in hexadecimal format. 00000015 00000005 0003000A 00000000 48656C6C 6F000000 a. Is th
    7·1 answer
  • Jamal wants to create a program that will play music during the afternoon. Which kind of loop should be used in the program?
    6·2 answers
  • Samantha is part of a project management team working on the initiation phase of a project. What is her team expected to do in t
    5·2 answers
  • What actions might contribute to recommendations you see online?
    9·1 answer
  • Create a timeline of the evolution of computers and their impact on society
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!