1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katovenus [111]
3 years ago
15

Why is information broken down into packets

Computers and Technology
1 answer:
SashulF [63]3 years ago
6 0

Answer:

because that how it be

Explanation:

because then you focuse packet to be separated in depth parts of a main topic like ink cooking it has four packets one for chopping one sautéing one meats and one for bake good

You might be interested in
If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
Juliette [100K]

Answer:

Yes, if you want to be undetected.

Explanation:

It is vital to always use a command that will ensure that one's activity is undetected. This is one of the important rules of corporate organizations to keep their data and activities safe and secure. The commend provided is a useful tool for detective works especially the activities of criminals and hackers. Therefore, if the admin wants to be undetected, the command should not be used.

8 0
2 years ago
Read 2 more answers
in java how do i Write a Java program that takes ten numbers as input to calculate and print the average of the numbers.
Andrei [34K]

Answer:

You could just use a code library.

Explanation:

8 0
3 years ago
List five applications field of a computer?​
True [87]

list five applications field of a computer?

answer= <em> </em><em>home</em><em> </em><em>,</em><em> </em><em>school</em><em>,</em><em> </em><em>h</em><em>o</em><em>spital</em><em>,</em><em> </em><em>bank</em><em>,</em><em> </em><em>super</em><em> </em><em>markets</em><em>,</em><em> </em><em>etc</em><em>.</em><em>.</em><em>.</em><em>.</em>

5 0
3 years ago
A technician has been notified of a problem on the network. After investigation, the technician determines that a specific inter
bogdanovich [222]

Answer:

Virus is a type of malware which is used in this case.

Explanation:

7 0
3 years ago
A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at
erastova [34]

Answer:

The correct answer to the following question will be "DHCP server".

Explanation:

A network manager that dynamically supplies and delegates equipment of clients with their IP addresses, standard portals and some other networking specifications, known as DHCP server.

  • It depends on the standard operating procedure classified as Dynamic Host Configuration Protocol to answer to client-specific broadcasting commands.
  • It's used to optimize the authentication mechanism of computers on IP channels, enabling them using applications and services including NTP, DNS, and any UDP or TCP-based networking protocol.

Therefore, the DHCP server is the right answer.

7 0
3 years ago
Other questions:
  • An iphone is a form of a computer
    7·2 answers
  • 1. Given a sequential list with n numbers, represented in a one-dimensional array A) Write an algorithm to check if the list has
    14·1 answer
  • If the base-10 system stops with the<br> number 9, then why isn't it called<br> base-9?
    15·1 answer
  • What does a page break do?
    13·1 answer
  • Gimme Shelter Roofers maintains a file of past customers, including a customer number, name, address, date of job, and price of
    8·1 answer
  • How to add a bill using the reciept capture?
    7·1 answer
  • I want to get an output picture in python but it says this. I'm using turtle
    12·1 answer
  • URGENT HELPP<br> WILL MARK BRAINLIST
    6·1 answer
  • Im learning about AI in my class and I'm confused about these two questions
    9·2 answers
  • What is the first phase of the project process?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!