1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nat2105 [25]
3 years ago
6

Data is broken into _____ to be transmitted over the internet

Computers and Technology
1 answer:
Gwar [14]3 years ago
8 0
Data is broken into packets
You might be interested in
Which of the following is not true of both the ACT and the SAT?
nlexa [21]
The answer for that is c
6 0
4 years ago
Read 2 more answers
The range A2:B4 has how many cells?<br><br> Answers:<br> 2,4,6,8
mylen [45]
6 cells because you have to drag and it becomes six cells .

8 0
4 years ago
Read 2 more answers
Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
SCORPION-xisa [38]

Answer: Snort

Explanation:Snort is a system which provides the service of the prevention of the intrusion. This system works as the open source for provision of the logging of packets and traffic analysis.

The functions in the snort are analysis of the protocol, content matching , searching etc. The main purpose of it is for the detection of the attack like stealth port ,CGI attacks etc.Other options are incorrect because they don't provides attack detection service.Thus the correct option is snort.

3 0
3 years ago
Select the correct images. From her stack of photographs, Alice has to pick images that a photographer shot using the sports mod
OLEGan [10]

Answer: i think its the horse the boy hopefully i helped

Explanation:

5 0
3 years ago
Read 2 more answers
Consider the following statement: String myMiddleInitial = “h”;
Levart [38]

Answer:

It may depend on the programming language, but this looks correct!

Good Job! :)

Explanation:

Could you please mark this answer as brainiest?

It would help me a lot :)

Thanks!

6 0
3 years ago
Other questions:
  • Then create a new Java application called "StringSlicer" (without the quotation marks) that uses methods to:
    9·1 answer
  • If you save a Word file as a Web page, what type of file will it be?
    12·1 answer
  • The purpose of a memo is to communicate directions, advice , or information true or false
    8·2 answers
  • Write a little man program that accepts three values as input and produces the largest of the three as output.
    5·1 answer
  • 50 POINTS PLEASE HELP MEEEEEEEEE!!!!!!
    6·2 answers
  • File Account.java contains a definition for a simple bank account class with methods to withdraw, deposit, get the balance and a
    8·1 answer
  • federal law requires public libraries to install filtering software on computers to prevent children from accessing adult conten
    14·1 answer
  • Convert the following into binary system<br>and vice versa.<br>106​
    6·2 answers
  • Define an iterative function named append_ordered; it is passed two arguments: a linked list (ll) whose values are ordered from
    15·1 answer
  • Does CLAIRE https://claire-ai.org/vision/ considered a representative of Roy Rotwell's Fifth Generation of innovation?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!