1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margaret [11]
3 years ago
14

Hi good morning

Computers and Technology
2 answers:
Natali5045456 [20]3 years ago
8 0

Answer:

1. SSH/Telnet.

2. SMTP.

3. DNS.

4. DHCP.

5. HTTPS/SSL.

6. FTP

Explanation:

1. Provides connections to computers over a TCP/IP network: the standard protocol used for this is SSH/Telnet, through port number 22 and 23 respectively.

SSH is acronym for secure shell.

2. Sends e-mail over a TCP/IP network: SMTP using port number 25.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3. Translates URLs to IP address: DNS using port number 53.

A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address. This simply means that, DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.

4. Automates assignment of IP address on a network: DHCP using port number 67.

Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.

5. Securely transports web pages over a TCP/IP network: HTTPS/SSL using port number 443.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

6. Transports files over a TCP/IP network: FTP using port number 20 or 21.

FTP is an acronym for file transfer protocol.

Nataly_w [17]3 years ago
7 0

Explanation:

I guess there is no need of mine for giving ans now

as the above guy has explained everything

You might be interested in
In its entirety, the CCM process reduces the risk that ANY modifications made to a system result in a compromise to system or da
Tom [10]

Answer: True

Explanation: CCM process is the process which basically watches over any change or modification that is being made in the data and it will only be implemented when there is no adverse effect of the change.It procedure helps in reducing the risk due to any modification made in data of a system. CCM process also take care of the confidentiality of data and integrity as well and helps inn maintaining it.Therefore the given statement is true.

8 0
3 years ago
* what is an electronic mail ?
Vikki [24]

Answer:

Electronic mail is a method of exchanging messages between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.

6 0
3 years ago
What are the cons of using keyboard shortcuts?
Yanka [14]

Answer:

Mistakes can easily occur while using them.

4 0
3 years ago
How do you change your age on here? I accidentally put that i was 15 but i am only 13. How do I change this?
oksano4ka [1.4K]
I honestly don't think they can or just change your account from what I know of I just tried just now to see for you. I think you jus gotta leave it lol. I'm 13 too I lit myself 16
5 0
3 years ago
Steve is creating a document with proper nouns, which Word continues to identify as being misspelled.
mash [69]

Answer:

it's D. B and C are correct.

Explanation:

The options are:

A. Skip the Spell Checker.

B. Right-click the noun and choose to Ignore All.

C. Right-click and Add to the dictionary.

D. B and C are correct.

You can either right-click the noun and choose to Ignore all. or you can Right-click and add to the dictionary. And this is because you are correct this time, as a proper noun can have misspelled type of spelling. And this is because it is some other language word, and that's why.

6 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following can be used to replace internal network addresses with one or more different addresses so the traffic tha
    9·1 answer
  • Presentation software allows business professionals to _____.
    14·2 answers
  • A TCP entity opens a connection and uses slow start. Approximately how many round-trip times are required before TCP can send N
    11·1 answer
  • Who has access to the source code of proprietary software?
    15·2 answers
  • What shortcut keys are used to go directly from global configuration mode to privileged exec mode?
    12·2 answers
  • The first step in the information processing cycle involves the _____ of data.
    10·1 answer
  • 1. What does MS-DOS use for input?
    5·1 answer
  • Dwayne wants a variable called "name" to appear in the interpreter and does not want a space after it. Which of these should be
    11·1 answer
  • How do you select a single cell, a single column, a single
    10·1 answer
  • What is pseudocode? O A way of describing a set of instructions in text form using plain english O A diagrammatic representation
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!