1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
3 years ago
12

Which of the following is an Internet supervisory protocol? O DNS IP O both A and B O neither A nor B

Computers and Technology
1 answer:
skelet666 [1.2K]3 years ago
6 0

Answer: Both A and B (DNS and TCP/IP)

Explanation: Internet supervisor protocols are the protocols that  have the supervising standards for the internet functioning. DNS (Domain name system)is the system that supervises the internet by the function of the domain names that is accessed by the user.It acts like phone phone book  that coverts the domain to the IP address.

TCP/IP is the(Transfer control protocol/Internet protocol) are the protocols that help in the function of the internet by providing the connection with the network.The internet runs with help of TCP/IP suite.Thus both, DNS and TCP/IP are supervisory protocol for internet.

You might be interested in
Write an if else statement that assigns 0 to the variable b and assigns 1 to the variable c if the variable a is less than 10. O
brilliants [131]

Answer:

if(a < 10)

{ b = 0; c = 1;}

else

{ b = -99; c = 0;}

Explanation:

4 0
3 years ago
Im Gonna Give Brainly a Second Chance<br><br> Everybody deserves a second chance
Nady [450]

Answer:

ok I know it's not for me but for who?

Explanation:

Just asking. And yes everyone deserves a second chance. Even liars?

please don't take my question wrongly have an above average day!

7 0
3 years ago
Read 2 more answers
Select the phrases that apply to Java classes or methods.
oee [108]

Answer:

graficar una lista de entradas

graficar una lista de entradas

crear un nuevo objeto

condiciones de prueba

romper un ciclo

romper un ciclo

Explanation:

7 0
3 years ago
A security analyst accesses corporate web pages and inputs random data in the forms. The response received includes the type of
leonid [27]

Answer:

Option c is the correct answer for the above question.

Explanation:

  • The vulnerability is a term that is used to state that any system has some limitation by which the system causes an error while performing the action.
  • The above question states a software and asked the action which is used by the analyst to prevent the limitation. So the system will use the input validation.
  • It is because this prevents the error. it is because this will help to proceed with the wrong or invalid information on the database and the database or system can not hold the wrong data.
  • Hence option c is the correct answer while the other option is not correct because other options can not able to fix the limitation of the above system.
6 0
3 years ago
You can access cloud files from any computer smart phone or tablet as long as it is connected to the Internet is it true or fals
Zepler [3.9K]

Answer:yes

Explanation:

because it is the internet

8 0
3 years ago
Other questions:
  • A data structure used to bind an authenticated individual to a public key is the definition of ________.
    14·1 answer
  • Is full dive vr possible and can we accomplish it with today’s technology? Explain why
    13·2 answers
  • HELP URGENT
    12·2 answers
  • . Write a toString method for this class. The method should return a string containing the base, height and area of the triangle
    10·1 answer
  • Match the following technologies with their applications.
    11·1 answer
  • Write a program that prompts the user to enter two characters and display the corresponding major and year status. The first cha
    15·1 answer
  • Windows displays a(n)
    11·1 answer
  • What is the data type of the following expression?
    12·2 answers
  • Where is the BIOS stored?<br><br> CPU<br> CMOS<br> RAM<br> Northbridge
    13·2 answers
  • Consider a game that is searched using random restart hill climbing strategy. Assume that the success rate for the game is 25%.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!