1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bogdan [553]
3 years ago
5

dash is a set of communication standard using for transferring file information between computers in a network​

Computers and Technology
1 answer:
8090 [49]3 years ago
4 0

Answer:

protocol

Explanation:

hope this helps.

You might be interested in
________ is the process the compiler uses to divide your source code into meaningful portions; the message means that the compil
Nesterboy [21]

Answer:

Parsing is the process uses to divide your source code into meaningful portions; the message means that the compiler was in the process of analyzing the code when the end of the file was encountered prematurely

Explanation:

In parsing process  the parser in compiler breaks code and data into smaller elements coming from lexical analysis phase.

6 0
3 years ago
The act of illegally copying software, music,or movies that are copied protect?
miv72 [106K]
It’s protects piracy C
4 0
3 years ago
Read 2 more answers
3.1.14 Wormhole CodeHS <br><br> May I have it in a copy and paste, please?
Sauron [17]

Answer:

3.1.14 Wormhole CodeHS

Explanation:

3.1.14 Wormhole CodeHS

6 0
2 years ago
Armando is trying to decide how he will alert players that the game is over in the new video game that he is designing. He is co
mojhsa [17]

Answer:

He is working on the outcome

Explanation:

Because this is the outcome if you fail or die and the other objectives are the following

operation: A single objective in a level of the the whole game

obstacles: Trying to stop the player like blocks or walls or traps

objective:The main goal of the game

8 0
2 years ago
There is always this thing that comes out and I can't answer one's question. How do I undo this?
Y_Kistochka [10]
You should enter your email address
8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the recommended size for bulleted text?
    5·2 answers
  • In addition to talking to other doctors remotely, telegraphy technology?
    5·1 answer
  • What is an activity that can help you enhance the appearance of your computer’s desktop?
    12·2 answers
  • Define Turbo C++ and how is the use of Turbo C++.?
    15·1 answer
  • Write a program to display the roll number of students who have scored 100 in math. display appropriate message if none have sco
    5·1 answer
  • Jared recently sent an email to all the members of his department asking them for their opinions about where the department shou
    11·1 answer
  • All dogs = 199999990158161231
    11·2 answers
  • Running the Disk Cleanup utility is a quick way to ________. Group of answer choices defrag your hard drive remove spyware progr
    10·1 answer
  • In a network, multiple critical paths can occur. true or false
    13·2 answers
  • In the table below, identify the data type that would be most suitable for the second field.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!