1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marshall27 [118]
3 years ago
5

What is the protocol used for the majority of network/internet traffic?

Computers and Technology
1 answer:
mash [69]3 years ago
7 0
This is rather ambiguous, but in this day an age, it has to be the "internet protocol" (IP). 
You might be interested in
Transaction processing systems (TPSs) provide valuable input to management information systems, decision support systems, and kn
nadezda [96]

A transaction is a simple task carried out as part of corporate operations. Transaction processing systems (TPS) handle business transactions for the corporation, supporting overall enterprise operations.

A TPS creates papers pertaining to a non-inquiry transaction and records the transaction itself, together with all of its results, in the database.

Today, TPS are required for business operations in practically every firm. TPSs feed information into organizational databases; they also serve as the framework for management-oriented information systems. Source data automation frequently involves direct data entering. Electronic data interchange is being utilized by transaction processing systems more and more. These systems offer computer-to-computer communication without the need for repeated data entry by substituting paper documents with formatted transaction data sent over telecommunications networks.

Learn more about information here-

brainly.com/question/15709585

#SPJ4

5 0
1 year ago
Definition of Computer forensics?
zysi [14]

Answer:

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation and maintain a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

Explanation:

If this helped you, please consider brainly.

Thank you ,

Miss Hawaii

5 0
2 years ago
Read 2 more answers
. Write a code to define a linked list node using the above defined structure student (i.e. the data of the node is a student st
enyata [817]

Answer:

struct node{

   student data;

   node* next;

};

Explanation:

The above written is the segment of code is the structure of node of the linked list.The data of the node is type student.So the data of the node of the linked list will consist of the student details and the next is the pointer which holds the address of the next node.

8 0
3 years ago
Edison wants to purchase a new computer and go to the Caribbean for spring break. The computer is priced at $1,299, and the vaca
Otrada [13]

Answer:

This question is imcomplete, here is the complete question

Edison wants to purchase a new computer and go to the Caribbean for spring break. The computer is priced at $1,299, and the vacation is priced at $750. He has only $1,537 in his checking account, so he cannot afford to purchase both. After much thought, Edison buys the computer and writes a check for $1,299. Identify what role money plays in each of the following parts of the story. Hint: Select each role only once. Role of Money Medium of Exchange Unit of Account Store of Value Edison can easily determine that the price of the computer is more than the price of the vacation. Edison has $1,537 in his checking account. Edison writes a check for $1,299.

Identify what role money plays in each of the following parts of the story.

Explanation:

Brian can effortlessly determine and conclude that the cost of the computer is more than that of the price of the vacation.= Unit of Account

Brian has a total amount of $1,537 in his checking account.= Store of value

Brian then writes a check for $1,299.= Medium of Exchange

5 0
3 years ago
Write a short program using a while loop which will display all of the even numbers starting with 12 and ending with 86. (test y
BARSIC [14]
Lua

for i =12,86,2 do

print (i)
end
5 0
3 years ago
Other questions:
  • Discuss the differences between dimensionality reduction based on aggregation and dimensionality reduction based on techniques su
    13·1 answer
  • An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect t
    10·1 answer
  • 5. RAM IS YOUR SYSTEM’S-
    14·2 answers
  • The Universal Containers research lab is publishing its latest research into knowledge articles assigned to the data category "C
    15·1 answer
  • Is there a relationship between cybercrime and traditional crime?
    6·1 answer
  • Student creates a Raptor program and uses the File Input and Output method to find the average of 5 test scores stored in a text
    5·1 answer
  • Select the education and qualifications that are most helpful for business analysis careers. Check all that apply
    11·2 answers
  • LAB: Plant information (ArrayList) Given a base Plant class and a derived Flower class, complete main() to create an ArrayList c
    6·1 answer
  • What does a hanging indent look like?
    7·1 answer
  • I am having trouble with this python question. I am in a beginner level class also so any solution that isn't too complex would
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!