1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shtirlitz [24]
3 years ago
11

What are the layers in the internet protocol stack? what are the principle responsibilities of each of these layers?

Computers and Technology
1 answer:
Andrew [12]3 years ago
3 0
1: Application
2: Presentation
3:Session
4: Transport
5:Network 
6: Data link 
7: Physical

Application is a Interface Layer and responsible Layer
<span />
You might be interested in
What do I have to do to get you to cancel this subscription? I have emailed several times and every dang month I get a $10 charg
alexdok [17]
Contact the moderation team’s email
5 0
3 years ago
What is the fifth and final stage in the process of media production?
Monica [59]

Answer:54

Explanation:

8 0
3 years ago
Which occurs during market equilibrium? Check all that apply
e-lub [12.9K]

Answer:

Explanation:

You do not have options please be more in depth it would help me with your question.

4 0
3 years ago
1 MB equals to how many GBs? Or 1 GB = how many MBs? i want to know how many MBs equal a GB, or how many GBs equal a MB; i'm get
Deffense [45]
Approximately 1,000 MBs are in a gigabyte
5 0
4 years ago
Which of the following files has the Ionic styles? ionic.bundle.css ionic.js ionic.css ionic.bundle.js
Law Incorporation [45]

Answer:

The correct option is ionic.css

Explanation:

Ionic style uses modes to customize the look of components. Each platform has a default mode, but this can be overridden.

And of all the options, only the ionic.css possesses the ionic styles

4 0
3 years ago
Other questions:
  • To use an outline for writing a formal business document what should you do after entering your bottom line statement
    10·1 answer
  • Which type of device log contains the most beneficial security data?
    7·1 answer
  • In a game, your character cleverly places an electronic bug on an unsuspecting felon's jacket to track his movements. The bug tr
    10·2 answers
  • Implement a program to measure the impact of application-level buffer sizes on read time. This involves writing to and reading f
    13·1 answer
  • The Mail Merge option is located in which tab? a;home b;insert c;refernces d;mailings
    11·2 answers
  • Many major employers routinely monitor the performance of their employees through the computers and telephones they use. Employe
    12·1 answer
  • What is the best stratiget to avoid paying intrest in your credit cared
    13·1 answer
  • Which statement best describes desktop publishing?
    10·1 answer
  • One key feature of malware is that it:
    13·1 answer
  • Why is a salt added to a password that is being stored in a database?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!