1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mazyrski [523]
3 years ago
9

_____ is the widely used transport layer protocol that most Internet applications use with Internet Protocol (IP).

Computers and Technology
1 answer:
hjlf3 years ago
3 0
Transmission Control Protocol
You might be interested in
Can anybody answer this
shutvik [7]

Answer:

Its the last one, CSS and HTML are similar but like it says some prefer one over the other.

6 0
3 years ago
Read 2 more answers
Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission fr
Tatiana [17]

Answer:

b) White-hat hacker

Explanation:

This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out  based on a agreement between the whihte-hat hacker and the client via a contract.  

8 0
3 years ago
The study of how to design software, solve problems such as computer security threats, or come up with better ways of handling d
Gnom [1K]

Computer engineering

3 0
3 years ago
Which two elements should be in a professional letter?​
blagie [28]
Intro, and Headings probably
4 0
2 years ago
What is computer how it is work​
Lyrx [107]

Explanation:

its an electronic device that processes data and stores information

4 0
3 years ago
Other questions:
  • To keep your emails concise and to the point
    13·1 answer
  • Discussion group may have a___________ who monitors the postings and enforces the sides rules​
    13·1 answer
  • What determines how large the crystals in an igneous rock will be?
    15·2 answers
  • What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?
    15·1 answer
  • Which part holds the "brains" of the computer?
    13·1 answer
  • Who was the father of computer?????​
    11·2 answers
  • What is meant by reflection?​
    9·2 answers
  • Which is the another name of automatic sequence control calculator​
    7·1 answer
  • Write code that outputs variable numCats. End with a newline.
    6·1 answer
  • What are the features of the title bar for the Microsoft word application?​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!