1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firdavs [7]
3 years ago
11

Question 3.3. Which of the following is NOT a computer protocol? FTP SMTP ISP TCP

Computers and Technology
1 answer:
algol [13]3 years ago
4 0
FTP -> File Transfer Protocol
SMTP -> Simple Mail Transfer Protocol 
TCP -> Transmission Control Protocol
ISP stands for Internet Service Provider, which isn't a computer protocol.
You might be interested in
Help me pleaseeee!!!!!
belka [17]

Answer:

15 unit square

Explanation:

7 0
3 years ago
Read 2 more answers
A user is attempting to access a shared file locally on their workstation. The file has Full control NTFS permissions assigned,
BaLLatris [955]

Answer:

The answer is read only permission

Explanation:

The effective permission for the user is the read only permission.

8 0
3 years ago
Your mobile device has gone over its subscribed data limit the past two months. During this time, you have noticed that the devi
Zolol [24]

Answer:D. The device needs an operating system update

Explanation:Operating systems are different programs mainly manufactured by software companies like Microsof,Apple etc, after initially installation are loaded into the computer by a boot program, operating systems manages all of the other application programs in a computer, it requires constant upgrade in order to be able to effectively carry out its activities. Application programs uses the operating system by making requests for services through a defined application program interface (API). Examples include Windows 7, Windows 8, Windows 10, Blackberry OS, Operating system Linux etc.

6 0
3 years ago
type of communication where a company’s computers can monitor assembly lines and equipment to keep them running safely and effic
Arisa [49]
<span>Type of communication where a company’s computers can monitor assembly lines and equipment to keep them running safely and efficiently is called machine to machine (M2M).</span>
7 0
3 years ago
When a superclass variable refers to a subclass object and a method is called on that object, the proper implementation is deter
Anni [7]

Answer:

D. Late binding

Explanation:

a. early binding.

b. non-binding.

c. on-time binding.

d. late binding.

The compiler performs a process called binding when an object is assigned to an object variable. The early binding (static binding) refers to compile time binding and late binding (dynamic binding) refers to runtime binding. Another name for late binding is dynamic linkages

It is a computer programming mechanism in which the method being called upon an object or the function being called with arguments is looked up by name at runtime.

When a superclass variable refers to a subclass object and a method is called on that object, the proper implementation is determined at execution time. The process of determining the correct method to call is known as Late Binding.

7 0
4 years ago
Read 2 more answers
Other questions:
  • In two or more complete sentences, summarize the difference between renewable and nonrenewable resources? Justify your responses
    13·2 answers
  • A computer ____ is the amount of data (measured in bits or bytes) that a cpu can manipulate at one time
    8·1 answer
  • Which setting on a profile makes a tab NOT accessible in the All App Launcher or visible in any app, but still allows a user to
    11·1 answer
  • For what parties the prepare documentation ​
    9·1 answer
  • 14. Which of the following statements is true? A. The most secure email message authenticity and confidentiality isprovided by s
    11·1 answer
  • What is network and also how many types of network are there as well
    6·2 answers
  • What is the purpose of a forecast worksheet?
    15·1 answer
  • Define the missing function. licenseNum is created as: (100000 * customID) licenseYear, where customID is a function parameter.
    12·1 answer
  • Discuss how the Internet has made our communication hypertextual, omnidirectional, and more interactive
    6·1 answer
  • How does the variance as a measure of the dispersion of a data set relate to the measure of central tendency (i.e. mean)? What c
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!