1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
suter [353]
3 years ago
5

Question

Computers and Technology
1 answer:
polet [3.4K]3 years ago
5 0

Answer:

ARP is a simple query–response packet protocol used to match workstations hardware addresses to IP addresses. In other words, ARP is the protocol used to identify nodes in a LAN. ARP is described in RFC 826

You might be interested in
For what three media types can Photoshop optimize images? ​
denis-greek [22]

Answer:

GIF, JPEG, and PNG

Explanation:

7 0
3 years ago
The _____ is the button that you push to take a photograph. i think its B Help PLZ
Sati [7]

Answer:

C

Explanation:

see the image on this web site as example: https://www.digitaltrends.com/photography/what-does-this-do-an-explanation-of-dslr-buttons/

4 0
4 years ago
Who wrote Hamlet? <br><br>Brainliest for the right answer​
Alenkinab [10]

Answer:

William Shakespeare wrote hamlet

Explanation:

7 0
3 years ago
Read 2 more answers
Your online actions can have real- world consequences. True or false?
EastWind [94]

Answer:

This is very often false. It's not like anyone knows where you are when you're online, so they really cannot do much about your actions. However, there are times where this is true.

3 0
2 years ago
Read 2 more answers
In the Mouse Properties window, you can
levacccp [35]
B- You can adjust the mouse's double-click speed.

Some computer mouse software (depends on brand) will allow you to set new tasks for the mouse to perform.  Sometimes there are mice that have extra buttons that can be programmed to do certain tasks.
6 0
4 years ago
Other questions:
  • Array testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cre
    10·1 answer
  • Which would be a responsible use of technology used by victims of cyberbullying? finding ways to strike back at bullies online.
    15·1 answer
  • What is the purpose of system calls, and how do system calls relate to the OS and to the concept of dual-mode (kernel-mode and u
    14·1 answer
  • Suppose we have a byte-addressable computer with a cache that holds 8 blocks of 4 bytes each. Assuming that each memory address
    7·1 answer
  • An array of Strings, names, has been declared and initialized. Write the statements needed to determine whether any of the array
    9·1 answer
  • Why computer is known as versatile and diligent device? Explain​
    7·1 answer
  • Is computing gcse easy or hard
    10·2 answers
  • 1. Choose a real or made up company, and describe at least three ways in which the company uses technology. (1-3 sentences. 3.0
    13·1 answer
  • Before creating a graphic, you should _____. Select all that apply. A. export it as an SVG file B. consider whe
    12·1 answer
  • What causes the hidden node problem in a wireless local area network (wlan)?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!