1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kazeer [188]
2 years ago
8

The purpose of an Internet _____ is to receive packets and send them along towards their final destination.

Computers and Technology
1 answer:
Bumek [7]2 years ago
7 0

The tool that receives packets and send them along towards their final destination is; Internet Server

<h3>Internet Servers</h3>

We are told that the tool is used to receive packets and send them along towards their final destination.

  • Now, the tool is an internet server because internet servers are softwares and hardwares that make use of HTTP and other protocols to respond to client requests that are made over the World Wide Web.

Now, the main job of an internet server is to display website content through storing, processing and delivering webpages to the final destination.

Read more about internet server at; brainly.com/question/20602197

You might be interested in
If you want to insert a column into an existing table what would you do
Amiraneli [1.4K]
This is generally the same on Docs and Word. You'd just highlight the table, go into the settings, and expand it by one column, on docs by dragging it out a little more on the given grid.
Hope this helps!
5 0
2 years ago
Im bored anyone up for a convo? lets talk.. =D
aleksandrvk [35]

Answer:

ok im fine with dat <3

6 0
3 years ago
Read 2 more answers
If your computer will not turn on, what is something you would do to diagnose the problem?
laiz [17]

I would hold down the power button for about 10 seconds, and then try pressing the power button again.

If you are using a desktop, try unplugging it and then plugging it and plugging it back in again. Then try pressing the power button again. If this does not work, then unplug your computer again, but now plug in something else into the same spot, like a lamp, or a phone charger, and see if they work. If they do not work, then it is the power outlet that is broken, not your computer. If they do work, then there is most likely something wrong with your computer or your power cord. Try powering on your computer using a different power cord. If this does not work, you should take your computer some where to get it checked, and fixed, if necessary.

If you are using a laptop, try charging it, and then hold down the power button for about 10 seconds, and then try pressing the power button again. if this does not work, you should take your computer some where to get it checked, and fixed, if necessary.

8 0
3 years ago
What term describes the process of transferring information from one computer to another
Flauer [41]

Syncing or maybe FTP or connection

5 0
3 years ago
If you have access to an ssn, but do not have permission to view certain folders or documents in that ssn, those folders and doc
hodyreva [135]
<span>If I remember it correct, if you have access to an ssn, but do not have permission to view certain folders or documents in that ssn, those folders and documents will be hidden. Or it depends on OS. But in most ways its hidden or masked.</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • If you are installing separate anti-virus and anti-spyware programs, which should you install first
    7·1 answer
  • Which type of denial of service attack exploits the existence of software flaws to disrupt a service?
    12·1 answer
  • ___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
    12·1 answer
  • Bob works at a cafe where he earns $11 an hr. which of the following graphs describes the amount of money that bob earns after x
    9·2 answers
  • You want to substitute one word with another throughout your document. What tool(s) should you use?
    9·1 answer
  • Alexi is writing a program which prompts users to enter their age. Which function should she use?
    6·2 answers
  • Discuss how 3D modeling enhances animation.
    13·1 answer
  • A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
    6·1 answer
  • When Brittany practiced her presentation, she gave a trusted adult a presentation checklist to use to critique her each time she
    15·1 answer
  • Which of these technologies has been most used by terrorist organizations?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!