1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
3 years ago
9

Question 1(Multiple Choice Worth 5 points)

Computers and Technology
2 answers:
LUCKY_DIMON [66]3 years ago
7 0
B is the answer lol yeah I had that some answer
aleksley [76]3 years ago
3 0

Answer:

b

Explanation:

it's not a c or d and now I have to make it 20 characters long so I will do this

You might be interested in
Which of the following OSI layers is responsible for the segmentation, multiplexing, flow control and host-to-host communication
Lisa [10]

Answer:

Transport Layer

Explanation:

The transport layer which is responsible for end-to-end communication over a network. Transport Layer breaks the data, allocated by Application layer in smaller units called segments. It is used to number every byte in the segment. It is also responsible for error correction and provides reliability to the user. It allows the host to send and receive error corrected data, messages or packets  over a network and ensures  that data should be received in the same sequence in which it was sent.  It also enables multiplexing and flow control.

7 0
3 years ago
In addition to regular watch features, which two features are often found on smart watches?
andriy [413]
Phone capabilities and fitness monitoring
5 0
3 years ago
What is the output of the following code segment?
Aliun [14]

Answer:

o

Explanation:

8 0
2 years ago
Which of the following option is not available in Insert>>Picture?
zysi [14]

Answer:

Word art

Explanation:

its copy and paste

7 0
3 years ago
Read 2 more answers
All of the following are aspects of the search process except
Len [333]
You need to provide the options or we cant provide you with the incorrect answer.
8 0
3 years ago
Other questions:
  • When pasting an object which has been copied from a different slide, where on the slide does the object paste, assuming nothing
    15·1 answer
  • You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network I
    13·1 answer
  • Which one of the following is an example of hacktivism according to you and why?
    11·1 answer
  • In ssl/tls, a specific set of protocols that a particular cryptographic system will use to provide protection is called a ______
    5·1 answer
  • The main disadvantage of using this device is its negative impact on network performance,resulting from the fact that any incomi
    10·1 answer
  • Which line of code will print I can code on the screen?
    13·1 answer
  • After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory l
    5·1 answer
  • Who was the creator of the game Fnaf?
    11·2 answers
  • 2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
    9·1 answer
  • Give me two reasons why return statements are used in code.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!