1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rama09 [41]
4 years ago
5

The various protocols in use on the internet are said to operate in layers in which the protocol(s) at each layer solve one prob

lem related to networked communication, and higher layers are built on top of, and rely on, the lower layers to do their jobs. From the list provided choose the two (2) answers that correctly describe which internet protocol relies on the other. For example: if protocol A relies on protocol B, it means that A is a higher level protocol than B, and thus protocol B must exist and work properly in order for protocol A to do its job.
Select two answers.A. TCP/IP relies on HTTPB. HTTP relies on TCP/IPC. DNS relies on TCP/IPD. TCP/IP relies on DNS
Computers and Technology
2 answers:
Gnom [1K]4 years ago
6 0

Answer:

HTTP relies on TCP/IP

DNS relies on TCP/IP

Explanation:

Alisiya [41]4 years ago
5 0

Answer:

-------------

--

---

--

Explanation:

You might be interested in
Which type of visual aid should students use to track small changes over time?
xenn [34]
Line graphs are used to graph change in time
7 0
3 years ago
Read 2 more answers
What is an effective way to display calculations in a Word document
DanielleElmas [232]
On the main Ribbon, click on Insert tab, in the Symbols Group click the arrow under Equations, and then Insert new equation.
5 0
4 years ago
Read 2 more answers
How are companies protecting their users from internet assault
cluponka [151]

Answer: Companies and organization are taking several steps to secure their user from internet abuse  .The methods are mentioned as follows:-

  • Offering security technologies in the form of package along with the service so that the protection resource is not required to be installed or bought from elsewhere such as antivirus technologies.
  • Using the web servers that are available with high security features
  • Using the websites that persist the built-in feature of giving virus or malicious interruption warnings so that user can become alert
  • Making users aware about internet abuse and provide information so that they can identify such happening in the service.

4 0
4 years ago
Name 5 different vegetables that are going to waste due to coronavirus issues
Aleks04 [339]

Answer:

u can search that on google

Explanation:

7 0
3 years ago
Tiny charts embedded in a cell that display a visual trend summary alongside your data are called ________.
bulgar [2K]
<span>The name for the tiny charts found in the background of a cell that displays visual trend summaries along with your data is sparklines. Sparklines can also be embedded in maps, spreadsheets, headlines, and other places. They make it easier to spot trends in the information you're studying.</span>
7 0
3 years ago
Other questions:
  • What is the f(n) runtime of the following pseudocode: sum-0 for A = N/2 downto 1 for B-1 t increment sum by B Explain: exactly w
    13·1 answer
  • At a local burger chain, a customer became extremely angry. Everyone took notice at the person, who was yelling at anyone he cou
    10·2 answers
  • Write a method called multiconcat that takes a string and an integer as parameters. return a string that consists of the string
    6·1 answer
  • Which statements about viruses are true? select the four statements that are true. select the four statements that are true. all
    9·1 answer
  • The clerk ordered three ribbons, 12 markers, and 15 erasers.
    10·1 answer
  • Which of these items will least likely increase pressure in the evaporative emission control system?
    9·1 answer
  • Convert the ProjectedRaises class to an interactive application named ProjectedRaisesInteractive. Instead of assigning values to
    15·1 answer
  • What tab on the Ribbon would you select to create a Photo Album ?
    5·1 answer
  • Which of the following is not a key component of a structure?
    6·1 answer
  • Add this in binary numbers . (1100011+11111+111) ​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!