1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
8

Helppppp oh helpppop plz​

Computers and Technology
1 answer:
Nataliya [291]3 years ago
6 0

Answer:

packet ìs the correct answer

You might be interested in
In most languages, if a file does not exist and a program attempts to open it in append mode, what happens?
chubhunter [2.5K]

Answer:

It create a new file in which writing of data begins.

Explanation:

A file can be open in the three mode:

-r (Read mode): open an existing file for the purpose of reading data from it.

-w (write mode): Create a new file for the purpose of writing data to it.

-a (append mode): open an existing file for the purpose of appending extra data to it but if the file does not exist, it create a new file and start writing data to it.

5 0
4 years ago
A company has offices in Honolulu, Seattle, Ogden, and Dublin, Ireland. There are transmission links between Honolulu and Seattl
Dmitry_Shevchenko [17]

Answer:

See explaination

Explanation:

Looking at telecommunications network, a link is a communication channel that connects two or more devices for the purpose of data transmission. The link is likely to be a dedicated physical link or a virtual circuit that uses one or more physical links or shares a physical link with other telecommunications links.

Please check attachment for further solution.

4 0
4 years ago
What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet
Luden [163]

Answer:

Explanation:

Asymmetric cryptography, is a cryptographic system that uses two different types of keys both public and private keys. Symmetric cryptography on the other hand uses the same type of key for both encryption. The benefit of using a combination when transferring data across the internet is that Asymmetrical cryptography is necessary to establish a secure connection while symmetrical cryptography can enhance the speed of the data transmission after connection has been established, thus both provide a unique benefit.

7 0
4 years ago
How do I report a user? (https://brainly.com/profile/TheBrainHelper-20043487)
Veseljchak [2.6K]

Answer:

I don't think you can report someone but you always can report the question

7 0
4 years ago
Read 2 more answers
[MCPE] my friend and I are playing MC:PE, I’m on their world. Is there a way for me to save their world so I can play whenever w
gulaghasi [49]

Answer:

Yes u can save their world but u cant download it.

Explanation:

5 0
3 years ago
Other questions:
  • Which of the following are stages in the computer life cycle? Check all of the boxes that apply.
    13·2 answers
  • In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and
    5·1 answer
  • What is the definition of the components that motherboards, ssds, processors, and cases are part of?
    10·1 answer
  • Fill in the missing step in the following deadlock situation. Two users from the local board of education are each running a pro
    15·1 answer
  • Where are domain user passwords stored?
    10·1 answer
  • How do u know when a website doesnt like u?
    11·1 answer
  • When designing a user interface, you can choose between the _______ or ______ layout Group of answer choices
    6·1 answer
  • Describe a game that you have played (video game or other type of game) that had a good balance between being easy to learn the
    6·1 answer
  • How do open online courses help with independent learning
    6·2 answers
  • Is anyone a robIox moderator?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!