1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
3 years ago
9

What is the standard internet protocol, which provides the technical foundation for the public internet?

Computers and Technology
1 answer:
luda_lava [24]3 years ago
3 0
You have to be carefull no bulling cuiberbulling people hurt there self for stuff like that
You might be interested in
I found a brand-new charger wire still in its plastic package, but it's six years old and has never been used. Is it safe to use
Oduvanchick [21]

Answer:

Yes it should be safe

Explanation:

hope it helps :)

3 0
3 years ago
Omnvmjsjskskskajskskzksososjfnjcjckskqnd
yarga [219]

what is the meaning to this??

4 0
4 years ago
Which statement below is true about how the functions of the digestive and circulatory system are connected.
telo118 [61]

Answer:

The digestive system breaks down the food into molecules that can be used by the cells. The circulatory system moves the molecules from the villi to all cells in the body.

8 0
3 years ago
Assume that name is a variable of type string that has been assigned a value . write an expression whose value is the first char
4vir4ik [10]

For the first question, you would just add the parenthesis to the string mutation1:

String word = "sadly";

String mutation1 = "(" + word + ")";

For the second you need the method substring from the String class:

It is defined as String.substring(begining, ending);

String name = "Smith";

String firstCharacter = name.substring(0, 1);

0 is considered the beginning of the string, then you get the next 1 characters.

7 0
3 years ago
In Windows-based systems, a value that specifies the rights that are allowed or denied in an access control entry (ACE) of an ac
blsea [12.9K]

Answer:

C. Access mask discretionary.

Explanation:

Access_Mask is the value that defines the rights used in access control entries (ACE), this value identifies if the trustee is allowed to access a secured object.

It can define rights in three categories: Standard, specific and generic rights.

4 0
3 years ago
Other questions:
  • The Freemont Automobile Factory has discovered that the longer a worker has been on the job, the more parts the worker can produ
    11·1 answer
  • Elaine works in a production house, and she determines the visual aspects of films and television. what is her profession?
    8·1 answer
  • Negative methods of behavior correction include all but this:
    9·1 answer
  • Which term describes the surrounding area of this image?
    10·1 answer
  • Que papel tuvo la innovación en la propagación de la telefonía móvil?​
    7·1 answer
  • Question # 2
    6·1 answer
  • Which Annotation tool provides the ability to convert the mouse icon when giving a presentation to better focus the
    14·1 answer
  • For a single CPU core system equipped wiith addditional hardware modes (besides user and kernel), choose those items that are ex
    7·1 answer
  • Can u guys report me as much as u can I’m trying to delete this account
    7·1 answer
  • Write and test a program that computes the area of a circle. This program should request a number representing a radius as input
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!