1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
3 years ago
12

TCP is the protocol responsible for the delivery of data on the Internet, and IP provides addresses and routing information.

Computers and Technology
1 answer:
Igoryamba3 years ago
4 0
 <span>TCP is the protocol responsible for the delivery of data on the Internet, and IP provides addresses and routing information.
This is a true statement.
</span>
You might be interested in
IN C++ PLEASE!!! Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector
ololo11 [35]
#include
#include
using namespace std;

int main(){

int input[] = {-19, 34, -54, 65, -1};
std::vector voutput:
std::vector vinput (input, input + sizeof(input) / sizeof(int) );

for (std::vector::iterator it = vinput.begin(); it != vinput.end(); ++it)
if(*it > 0) voutput.insert(voutput.begin(), *it);
for(std::vector::iterator it = voutput.begin(); it < voutput.end(); ++it)
std::cout << *it << ‘\n’ ;

return 0;
}
6 0
3 years ago
Which type of firewall automatically adjusts its filtering rules based on the content of the traffic of existing sessions?
vaieri [72.5K]

Answer: Dynamic packet filtering

Explanation:

Dynamic packet filtering is the type of fire wall which is used automatically to enabled the modification in the real time based on the traffic content according to the filtering rules.

The dynamic packet filtering also facilitates to monitor the actual state of connection which is active.

It is also used to determine the actual state of network packet and permits the packet of network pass through firewall.

7 0
4 years ago
In a bluesnooping attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to
Kay [80]
The answer is depends. You can only get what the port lets you get. If the phone bans sending photos over Bluetooth than you can’t get the photos
3 0
3 years ago
Which of the following which of the following is an advantage of using functions ​
Paha777 [63]

Answer:

kkbvvvvvvvvvvvvvvvvv'vvvkk

4 0
3 years ago
9.17 LAB: Acronyms An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is
AlexFokin [52]

Answer:

Hence the code is given as follows,

import java.util.Scanner;

public class LabProgram {

   public static String createAcronym(String userPhrase){

       String result = "";

       String splits[] = userPhrase.split(" ");

       for(int i = 0;i<splits.length;i++){

           if(splits[i].charAt(0)>='A' && splits[i].charAt(0)<='Z')

               result += splits[i].charAt(0);

       }

       return result;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       String s = scan.nextLine();

       System.out.println(createAcronym(s));

   }

}

6 0
3 years ago
Other questions:
  • What is the most common way for computing systems and devices to authenticate a person’s identity? citi
    10·1 answer
  • Which of the following is not an advanced strategy you may use to help you conduct a search on the Internet?
    14·1 answer
  • Maya enjoys connectedWith her friends and social media apps but one of her friends post a lot of stuff that my thinks it’s annoy
    14·1 answer
  • Software for pcs contains a ________ program that guides you through the installation process.​​
    7·2 answers
  • Which firewall has a network interface located in a unique network segment that allows for true isolation of the segments and fo
    9·1 answer
  • Which of the following is a bad password? Select one: a. The acronym for the title of your favorite song plus the year it came o
    11·1 answer
  • To which built-in object does the function sin(x) belong?
    12·1 answer
  • In 5-10 sentences, describe how computer networks work.
    6·1 answer
  • Suppose I create a new kind of Java object, called "Kangaroo". Further suppose that at any given time, all instances of this new
    6·1 answer
  • A(n) _________ Web page displays customized content in response to keyboard or mouse actions or based on information supplied di
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!