1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
3 years ago
10

Software applications called _____ provide the means to record information that passes through a computer or router that is hand

ling Internet traffic.
Computers and Technology
1 answer:
Bezzdna [24]3 years ago
3 0

Answer:

sniffer programs

Explanation:

Software applications called <u>sniffer programs</u>  provide the means to record information that passes through a computer or router that is handling Internet traffic.

You might be interested in
Write the Flowchart to find Even number between 1 to 50<br>​
ASHA 777 [7]

Answer:

See attachment for flowchart

Explanation:

Required

Flowchart to fine even from 1 to 50

The flowchart has been attached.

The rough algorithm (explanation) of the flowchart is as follows.

1. Start

2. Initialize num to 1

3. Check if num is less than or equal to 50

  3.1 If yes

      3.1.1 Check if num is even

      3.1.1.1 If yes

         3.1.1.2 Print num

  3.1.3 Increase num by 1

 3.2 If num is greater than 50

    3.2.1 Stop

4. Goto 3

4 0
3 years ago
What happens if part of an ftp message is not delivered to the destination?
Oliga [24]

The message is lost when an FTP message is not delivered to its destination because FTP doesn't use a reliable delivery method.

<h3>What is FTP?</h3>

FTP is an abbreviation for file transfer protocol and it can be defined as a type of server that's designed and developed to store and provide files for download, as well as sharing between two or more users on an active computer network.

Generally, the message is lost when an FTP message is not delivered to its destination because FTP doesn't use a reliable delivery method.

Read more on FTP here: brainly.com/question/20602197

#SPJ12

4 0
2 years ago
Yall rachits and yall eat butt xD
Trava [24]
Please use this for questions.
6 0
3 years ago
Read 2 more answers
An IT specialist is consulted about setting up a peer-to-peer network. What would the specialist say about security risk in this
ohaa [14]

I just did this, its A

6 0
3 years ago
Read 2 more answers
A picture drawn in 3 d is called?​
Varvara68 [4.7K]

Answer:

autostereogram

Explanation:

that^

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which type of architecture places a firewall in front of the VPN to protect it from Internet-based attacks as well as behind a f
    6·1 answer
  • ____ is typically used with lans that have a star topology and can be used in conjunction with twisted-pair, coaxial, or fiber-o
    12·1 answer
  • A function may return a pointer, but the programmer must ensure that the pointer:
    14·1 answer
  • What are the advantages of businesses using Twitter ?
    12·1 answer
  • What type of network is capable of delivering voice, video streams, text, and graphics between many different types of devices o
    15·1 answer
  • when using presentation software, which menu can you use to duplicate a slide to use as a template for a new slide?
    14·1 answer
  • Of all excavation hazards, _______ poses the greatest risk
    8·1 answer
  • What is drop shipping and how it works on amazon?
    12·1 answer
  • Describe the different
    12·1 answer
  • Each bolt diameter in the standard system can have one of two thread pitches, or UNE.​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!