1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
12

The set of rules for how computers talk to one another is called

Computers and Technology
1 answer:
lianna [129]3 years ago
6 0
Protocol. Like TCP/IP or HTTP etc
You might be interested in
If x is an int, which of the following statements adds 5 to the current value of x and stores the new value back in x?
faust18 [17]
X += 5;

----------------------------
6 0
3 years ago
How to check if students viewed an assignment canvas.
Greeley [361]
Which app are you using?
6 0
2 years ago
Los elementos de la comunicación técnica son el medio, el código y el contenido, ¿Esta información es falsa o verdadera?
LenaWriter [7]

la respuesta es verdadera

Explanation:

V

7 0
3 years ago
How many 16-byte cache blocks are needed to store all 64-bit matrix elements being referenced using matlab's matrix storage?
kenny6666 [7]

answer:

4 16-byte cache blocks are needed.

3 0
3 years ago
Describe five ways in which Process Explorer (procexp) can be used in computer forensics as part of an investigation
nataly862011 [7]

Answer:

 The process explorer is mainly used for tracking the actual problems in the system. Process explorer is also known as proc-exp and it is also used as system monitoring where it monitor the microsoft window that are typically created by the SysInternals.  

The following are the five ways in which the proc-exp (Process explorer) are used in the computer forensics for the purpose of investigation are:

  • The process explorer mainly provide the various types of functionality to the task manager for monitoring the system properly.
  • It basically used in the system for tracking the main problems.
  • It used in computer forensics for tracking the system problems and it give the detail information about the system memory also.
  • It keeps track all the virus and malicious software in the computer system.
  • It helps for investigation purpose as by using the process explorer we can get all the information about the particular computer system and software.  

4 0
3 years ago
Other questions:
  • How many total channels are available in the United States for wireless LAN use in the unlicensed 2.4ghz ism band ?
    6·1 answer
  • Enlist the various data analysis methods for study of Infrasonic waves, Seismic waves, Earthquake prone areas and how AI can be
    15·1 answer
  • In some cases, certain Hyper-V guest operating system features do not function properly using the operating system's own device
    9·1 answer
  • What behaviors are most common in a successful entrepreneurship
    9·1 answer
  • Which method will return the first element in an ArrayList employees?
    5·1 answer
  • look at sum of my horrible drawings lol these were last year XD let meh see sum of yalls art!! im not into drawing as much but i
    8·1 answer
  • Which of the following is an advantage of using variables?
    9·1 answer
  • Choose the correct item. Check your answers in the text.<br>3​
    15·1 answer
  • Which statement correctly differentiates how to use list and table styles?
    12·2 answers
  • Is pseudocode obtained from Algorithm or is Algorithm obtained from pseudocode?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!