1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marshall27 [118]
3 years ago
5

What is the protocol used for the majority of network/internet traffic?

Computers and Technology
1 answer:
mash [69]3 years ago
7 0
This is rather ambiguous, but in this day an age, it has to be the "internet protocol" (IP). 
You might be interested in
The smallest unit of storage is​
Snowcat [4.5K]

Answer:

Hey mate......

Explanation:

The smallest unit of storage is Bytes......

hope it helps you,

mark me as the brainliest,

follow me..........

3 0
2 years ago
A spreadsheet contains the maximum weight and maximum height for fifty dog breeds. The breeds are located in rows, and the weigh
MrRa [10]

Answer:

a. Locate

Explanation:

Question options (obtained on the net):

a. Locate

b. Sort

c. Filter

d. Replace

Explanation:

The largest value of the weights of the dog breed in row 43 is the maximum weight of the dog breed in the row

The 'MAX' formula or the 'Autosum' tool can be used to give the largest value in a row, or column

To locate the maximum value in MS Excel, the ADDRESS and MATCH and MAX functions are combined and entered into the blank cell on the right, specifying the same range for the MAX and MATCH functions, and a '0' for the MATCH function as well as a '1' for the ADDRESS function as follows;

=ADDRESS(MATCH(MAX(A1:E1), A1:E1, 0), 1)

Therefore, to navigate to the maximum weight, Emily should use a <em>locate</em>(ing) tool navigate to the information on the spread sheet

8 0
3 years ago
How can earn more answer from brainly less than two minutes, please
Andrei [34K]
You have to answer other people’s questions.
6 0
3 years ago
When storage devices write data, instructions, and information on storage media, they are creating output. what best describes t
alukav5142 [94]
Um the data will always be data and mothing will change but it will stay as data just data
5 0
3 years ago
Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or fi
zavuch27 [327]

Answer:

This is not a good solution

Explanation:

Your web browser uses port 80 outgoing to make web requests, so if you’re blocking incoming port 80, all you’re blocking is users of the organization from connecting to the internet. You have indeed close a vulnerable port to access from hackers, but this also can reduce the productivity of the organization.

3 0
3 years ago
Other questions:
  • Sugar can be listed in many different forms except
    9·1 answer
  • Plz answer me will mark as brainliest ​
    7·2 answers
  • In step 2 of the mail merge process you must be prepared to
    6·2 answers
  • Fatal error: Class 'Drush\Commands\DrushCommands' not found in /Users/amy/testsite/Sites/acquia dev desktop/fresh-install/module
    7·1 answer
  • Which rule should be followed to stay safe online
    5·1 answer
  • Name the functional arms of MSDE.
    13·1 answer
  • To combine concepts or ideas into a whole is called
    11·2 answers
  • Describe the functions of a system software​
    6·2 answers
  • "True or False? Software designers use layering and other techniques to organize large software systems."
    13·1 answer
  • David plays racing games on his way to work. He uses the analog stick to navigate his vehicle through other artificial intellige
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!