1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
3 years ago
15

_______and ________ enables computers to communicate and it can pass information between two networks.

Computers and Technology
1 answer:
lozanna [386]3 years ago
4 0

Answer:

Internet Protocol and Transmission Control Protocol        

Explanation:

Internet protocol, which is also known as IP and Transmission Control Protocol, which is also known as TCP are the two important protocols that enables the computers to communicate various information and data and allow it to pass between two networks. It allows computers to connect to each other.  They are developed by Bob Kahn and Vint Cerf.

You might be interested in
Match the metric units with these measurements
zavuch27 [327]
Force:newtons
distance:meters
work:joules
power:either watts or horsepower
energy:joules
time:kiloseconds and milliseconds
6 0
3 years ago
a mobile base in an urban environment has the power of 15 microW at 175 m. If the propagation follows an inverse cube power law,
Evgen [1.6K]

Answer: Power P at distance 0.7 km is: 0.234 µW

Explanation:

We know that

inverse cube-power law.

Thus Power, P = c / d³

Substituting we have

15 µW = c / (175 m)³

c = (15 µW) x (175 m)³

Then finally Power value at 0.7 km.

Will be

P = c / d³

P = ((15 µW) x (175 m)³) / (700 m)³

= (15 µW) x (175 / 700)³

= (15 µW) x (0.25)³

=(15 µW) x (0.015625)

P = 0.234 µW

8 0
4 years ago
Suppose you develop an app and want to generate revenue but do not want to maintain the app. What would be your best choice?
valentinak56 [21]
I think it would be d
6 0
4 years ago
1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
enyata [817]

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

4 0
3 years ago
A document that promises to pay specified sums of money on specified dates and is a debt to the issuer is called
MissTica
<span>A document that promises to pay specified sums of money on specified dates and is a debt to the issuer is called a bond</span>
6 0
3 years ago
Other questions:
  • A vehicle travels 2345 m in 315 toward the evening sun. What is its velocity
    13·1 answer
  • Assume that given , middle and family are three variables of type string that have been assigned values . Write an expression wh
    5·1 answer
  • PowerPoint’s _____ feature can assist you in finding answers to questions such as “How can I specify which slides to print?” a.
    6·1 answer
  • If you witness physical bullying and want to help, what should you consider first?
    5·1 answer
  • What are some of the academic benefits of a later start time that Jordan mentions​
    12·1 answer
  • What are use class diagram, use case description and activity diagrams for use cases?
    7·1 answer
  • Which of the following code correctly registers a handler with a button btOK?a. btOK.setOnAction(e -&gt; System.out.println("Han
    6·1 answer
  • Dave wants to host a website and he needs an operating system that is free of cost. Which operating system should he use?
    11·1 answer
  • How many tens are there in the number 156?<br> A. 1<br> B. 15<br> C. 6<br> D. 56
    7·2 answers
  • To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!