1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kykrilka [37]
3 years ago
9

_______ is the protocol suite for the current Internet.

Computers and Technology
1 answer:
Gala2k [10]3 years ago
8 0
A? not very sure sorry
You might be interested in
Edhesive assignment 4 student schedule python
Phantasy [73]

Answer:

Explanation:

do you know how to do some of it or do you need the whole answer?

3 0
3 years ago
Read 2 more answers
A group of computers that are interconnected in order to share information or documents is called a
zaharov [31]

Answer:

computer network

Explanation:

group of computers that are interconnected in order to share information or documents.

4 0
3 years ago
Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
zalisa [80]

Answer:

router.

Explanation:

Router is the main connection for a house network to the Internet, the firewall function is combined to the router. Every house network must have a firewall to protect their privacy.

The router provides the hardware firewall while the windows provides the software firewall.So the answer to this question is router.

5 0
3 years ago
Pls help ASAP I’ll brainlest
goldenfox [79]

Answer:

Trash#7519 for discord loser

Explanation:

8 0
3 years ago
What size hard disc is recommended for powerpoint writting
mixas84 [53]

Answer:

Depends on how many PowerPoint files you want to store and how long they are. I'd recommend at least a 256GB hard drive to store your OS and software and then leave space for PowerPoints.

5 0
3 years ago
Other questions:
  • Which examples demonstrate appropriate use of media for a school project? Check all that apply. showing cartoons to teach about
    6·2 answers
  • A four year old laptop will not boot and presents error messages on the screen
    8·1 answer
  • _____ is a technique that combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protoc
    11·1 answer
  • A machine on a 10 Mbps network is regulated by a token bucket algorithm with a fill rate of 3 Mbps. The bucket is initially fill
    12·1 answer
  • Information is data converted into useful, meaningful context. What are data characteristics that change or vary over time?
    8·1 answer
  • On the topic of "Bridging the Digital Divide", why should companies consider the digital divide?
    9·1 answer
  • True/False: not is evaluated first; and is evaluated next; or is evaluated last.
    13·1 answer
  • This finding maximum number function will keep on going until we reach at the last value
    12·1 answer
  • Aisha designed a web site for her school FBLA club. Which item should Aisha consider for improved responsive design?
    6·2 answers
  • Suppose we want an error correcting code that will allow all single-bit errors to be corrected for memory words of length 15. 1.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!