1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nirvana33 [79]
3 years ago
6

Anybody know this question???

Computers and Technology
1 answer:
vlada-n [284]3 years ago
4 0

i believe the choice you are ooking fo

You might be interested in
Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
ad-work [718]

Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, etc then TCP and UDP vacation spot port numbers are dynamically generated with the aid of using the sending tool that allows you to music the responses to requests.

<h3>Which TCP IP software layer protocol is generally used to map IP addresses to the Web pages?</h3>

FTP (File Transfer Protocol) It is one of the extensively used software layer protocols of the TCP/IP protocol suite. FTP is largely used to change facts among host gadgets over the Internet or Intranet securely.

TCP and UDP vacation spot port numbers are dynamically generated with the aid of using the sending tool that allows you to music the responses to requests. TCP mechanisms retransmit facts while an acknowledgment isn't always acquired from the vacation spot device inside a hard and fast duration of time,.

Read more about the L2TP:

brainly.com/question/15327815

#SPJ1

3 0
2 years ago
A word that has a specific, predefined meaning in a programming language is called
vampirchik [111]
<span>The correct answer is


A keyword</span>
5 0
3 years ago
Which are characteristics of pseudocode? Select all that apply.
jeka94

Answer:

A,B,C

Explanation:

3 0
3 years ago
The photographer for "The Migrant Mother" photograph used _______________, which is a technique that would be considered unethic
d1i1m1o1n [39]

Answer:

The technique used by the photographer which would be considered unethical today is:

Stage Managing

Explanation:

  • The Migrant Mother is a famous that was captured by the photographer named Dorothea Lange. This photograph was taken during the era of great depression that shows the misery of a women as well as her courage.
  • The photographer used the stage managing technique because the women in the photograph purposefully posed for the picture in order to let others know about their plight. She wanted to develop awareness as well as wanted the Government to help farmers.
  • The name of the women in the picture is Florence Owens Thompson and she was a mother of seven children. She lived in California.

8 0
3 years ago
Read 2 more answers
An IT specialist is consulted about setting up a peer-to-peer network. What would the specialist say about security risk in this
ohaa [14]

I just did this, its A

6 0
3 years ago
Read 2 more answers
Other questions:
  • It is important that data being imported from a text file into access are separated by a character, such as a comma, which defin
    8·1 answer
  • What to do when the tool bar for paint tool sai dissapears?
    12·1 answer
  • Write a program that asks the user to enter a whole number then outputs a 0 if the number is even or a 1 if the number is odd. (
    14·1 answer
  • Josh's boss asked him to write a letter to their customers explaining some upcoming price increases. But Josh was in a hurry to
    8·2 answers
  • After which stage in the information processing cycle can data be referred for future use?
    7·1 answer
  • Elwin Osbourne, CIO at GFS, Inc., is studying employee use of GFS e-mail for non-business communications. He plans to use a 98%
    6·1 answer
  • Is the following statement TRUE or FALSE?
    9·1 answer
  • Secondary hard drive whats its purpose
    5·1 answer
  • 9. Themes can be modified using variants. *<br><br>True<br>False​
    7·2 answers
  • If I am working in a document and wish to follow a hyperlink, what should I do?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!