1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
3 years ago
13

The network layer of the Internet model uses the _____________ protocol to route messages though the network.

Computers and Technology
1 answer:
RUDIKE [14]3 years ago
3 0

Answer:

Capa de Internet. La capa de Internet, también conocida como capa de red o capa IP, acepta y transfiere paquetes para la red. Esta capa incluye el potente Protocolo de Internet (IP), el protocolo de resolución de direcciones (ARP) y el protocolo de mensajes de control de Internet (ICMP).

Explanation:

You might be interested in
A wireless mesh network with 17 computers would need _______________ connections.
malfutka [58]
Oneeee hundreeeed and thirdy six
4 0
4 years ago
What is the main function of a CD-RW.​
otez555 [7]

Answer:

A CD-RW (which stands for Compact Disc ReWritable) is a Compact disc that can be recorded and erased multiple times. It can hold data or music. Most of the time it will hold data, since many CD players can not play CD-RWs. During its development, the format was known as CD-E, which stands for Compact Disc Erasable.

5 0
3 years ago
State whether True / False:<br>The pause option stops the recording temporarily.*<br>True<br>False​
defon

Answer:

true

Explanation:

when you pause a recording it will temporarily stop but, when you hit record again it will continue where you left off

7 0
3 years ago
Consider a situation where we have a file shared between many people.  If one of the people tries editing the file, no other pe
Sergeu [11.5K]

Explanation:

I am a collection of this process from Trash on the computer system and the program that included a new twist on the computer and the skin that appears after loading and the Windows operating system it was much that appear on identifying long horizontal bar at the bottom of the screen and water pollution and its control car parts of the computer with enough letters and adware if for the collection of the fat calculation in the complete committee that in the water method is a product of a screensaver been disciplined displayed at the subject of the right click an icon To Number Sau new file getting opened on you can getting opened on a forgiving of an operational effectiveness of the program is a false false false

7 0
3 years ago
Which type of password would be considered secure
ElenaW [278]
Most secure passwords contain a variation of; Uppercase letters, lowercase letters, numbers, and symbols.

Hope this helped!
8 0
3 years ago
Read 2 more answers
Other questions:
  • 2 Which statement best explains how computers are used to analyze information?
    6·1 answer
  • Copyrighted software that is distributed at no cost for a trial period is called?
    12·1 answer
  • Como puedo poner fondo a mi teclado​
    9·1 answer
  • cd to the directory called final that is located within my home directory. While viewing the file called mypasswd you notice tha
    12·1 answer
  • Which of the following is a function of the slip yoke used on a driveshaft?
    14·1 answer
  • Charles Montesquieu believed that the
    15·2 answers
  • During the first six months of his job, Enrique's boss gave him weekly feedback about his performance. What component of effecti
    9·1 answer
  • Could anyone help me with this assignment please?
    6·1 answer
  • What are the two protocols used most often with iot devices? (select two. )
    10·1 answer
  • if a college wanted to provide its students with access to a network that could be used in any of the buildings across campus, i
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!