1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
2 years ago
9

What does social protocol means in network?

Computers and Technology
1 answer:
Leokris [45]2 years ago
4 0

Answer: a social protocol and something like DNS is that little socialbehavior, cues, or relationships are carried through DNS.

Explanation:

You might be interested in
The system where the unit of measurement is centimeter
aleksklad [387]

Answer:

International System of Units

Explanation:

3 0
3 years ago
Compressing a file is also called
Elan Coil [88]

Answer:

Compressing files are also called zipped files.

Hope this helped you!

Explanation:

4 0
3 years ago
Read 2 more answers
If you turn your volume to loud on u'r headphones can it break the sound quality of the speaker?
zzz [600]
Yes, it is possible to "blow the speaker" in your headphones by listening to loud music (such as high BPM stuff, like extratone or extremely bass-ey stuff)
7 0
3 years ago
Read 2 more answers
Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
astraxan [27]

Answer:

uuuuu

Explanation:

8 0
2 years ago
Read 2 more answers
You received a call form a user who brought her own device to the office but cannot find or connect to the company WLAN. The lap
lapo4ka [179]

Answer:

Company WAP has SSID broadcast disable

Explanation:

Disabling SSID broadcast will make your WLAN network name invisible to other users. However, this only hides the name, not the network itself. that's why the user cannot find the company WLAN on her computer but yet can connected to the company WLAN and can browse to multiple websites with no problem from their company-assigned laptops.

8 0
3 years ago
Other questions:
  • Exposing employee and customer personal data to an untrusted environment is an example of:
    9·1 answer
  • Which occupation requires certification by the state?
    15·2 answers
  • Every character is represented by a code. The ASCII code for upper letter A is 65 and for lower a is 97. Similarly the numeric c
    9·1 answer
  • In addition to the four primary computer operations, today's computers almost always perform ____ functions.
    7·1 answer
  • Carlos own a hardware store.He currently is not using any software to track what he has in the store. .In one to two sentences,
    10·1 answer
  • Who is hurt by piracy
    10·1 answer
  • A<br> is an list of steps to complete a task. *
    9·1 answer
  • WILL GIVE BRAINLIEST!!!!!!!
    10·2 answers
  • List three features of the third generation of computers
    13·1 answer
  • Write a C# program named ProjectedRaises that includes a named constant representing next year’s anticipated 4 percent raise for
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!