1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
2 years ago
12

The TCP/IP stack has five layers, namely application, transport, network, link, and physical.

Computers and Technology
1 answer:
katovenus [111]2 years ago
3 0

Answer:

it is true if jou asking me

You might be interested in
_______ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.
snow_lady [41]

Answer:

C) Computer-aided Design

Explanation:

Options:

a. Computer-aided engineering

b. Computer-aided evaluation

c. Computer-aided design

d. Computer-aided manufacturing

C) Computer-aided design is correct answer

(Hope this helps can I pls have brainlist (crown)☺️)

6 0
3 years ago
Write down a pair of integers whose sum is​ 0
Tems11 [23]

Answer:

-1 ans +2 are the pair of integers whose sum is 0.

3 0
3 years ago
Microsoft ____________________ is a complex, full-featured firewall that includes stateful packet filtering as well as proxy ser
Lesechka [4]

Answer:

Internet Security & Acceleration Server (ISA)

Explanation:

<h2><u>Fill in the blanks </u></h2>

Microsoft <u>Internet Security & Acceleration Server (ISA)</u> is a complex, full-featured firewall that includes stateful packet filtering as well as proxy services, NAT, and intrusion detection.

4 0
3 years ago
What interprets software instructions and literally tells the other hardware devices what to do, based on the software instructi
Anestetic [448]
I believe it's the control unit. 

8 0
3 years ago
Write a function expand_string(a, pre, suf, num) that takes the parameters a,pre,sub and num appends the prefix pre, and suffux
kramer

Answer:99

Explanation:88

7 0
2 years ago
Other questions:
  • You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits m
    13·1 answer
  • Which of the following guidelines about forwarding e-mail messages is most appropriate?
    12·2 answers
  • To increase usability, take care to place important content, such as logos, names, CTAs, and major links, ______ of potential sc
    11·1 answer
  • 40 is 20 % percent of what?​
    9·1 answer
  • What is the term for a combination of user name and domain name that identifies a user so he or she can receive Internet email?
    6·1 answer
  • Software that tries to monitor and track the way you use your computer.​
    10·2 answers
  • Alishia's employer has its corporate office on one side of their city, but its data
    5·1 answer
  • 3. Cellular phone technology works on a system of geographically separated zones
    12·1 answer
  • What woman ran for president on the National Equal Rights Party, receiving 4,149 votes in 6 states in 1884?
    5·1 answer
  • 4.8 code practice question 1 edhesive
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!