1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
13

Explain the role of protocol and standard organization in facilities interoperability in nertwork communication ​

Computers and Technology
1 answer:
Andru [333]3 years ago
8 0

Answer:

Protocols are rules created to ensure messages are properly received and understood.  The following protocol requirements must be met:

1. An identified sender and receiver;

2. Common language and grammar;

3. Speed and timing delivery; and

4. Confirmation or acknowledgment requirements.

Explanation:

You might be interested in
Array elements must be ________ before a binary search can be performed.
Sladkaya [172]
In order.
You have to be able to see if its on the left or right side of the midpoint
7 0
3 years ago
Please help ⊙﹏⊙ thank you <3
mr_godi [17]

Answer:1. the importance of preventing maintenance is to advoid injuries or harm

2.true

Explanation:

5 0
3 years ago
Read 2 more answers
Using the triple DES algorithm, which is the cipher text?
kodGreya [7K]

Answer:

D. output derived from key K3

Explanation:

The cyphertext = EK3( DK2(EK1(plain text)))

And from the above, it is quite clear that in the case of the triple DES, the plain text is first encrypted using key 1, and then it is decrypted using the key 2. Finally, it is encrypted using the key 3, and this results in the final encrypted content, and which is the ciphertext. Thus, this clarifies that the output derived from the key k3 is the actual ciphertext, and hence the correct option for the above question is as mentioned above.

6 0
3 years ago
What is the exclusive legal right granted to all authors and artists that gives them sole ownership of their work to print, publ
Arisa [49]
The answer is copyright like for example if you copy and paste a essay offline and don’t give credit to the author it called copyright
7 0
3 years ago
Read 2 more answers
David has created a lot of styles and now his Quick Style Gallery contains styles he no longer uses.
shusha [124]

Answer:

Right-click the style in the Quick Styles Gallery, and select the Remove from Quick Style Gallery option.

Explanation:

3 0
4 years ago
Other questions:
  • Who gave a demonstration of modern computer systems showing a mouse and when?
    8·1 answer
  • Write a statement to add the key Tesla with value USA to car_makers. Modify the car maker of Fiat to Italy. Sample output for th
    9·1 answer
  • Fred has to write a report on the general opinion of the influence of television on political decision-making. What internet res
    7·2 answers
  • _______ are special incentives or excitement-building programs that encourage consumers to purchase a particular product, often
    7·1 answer
  • Which of the following is the most accurate description of what is known as the "digital divide". The digital divide is about ho
    5·2 answers
  • What is a piece of information sent to a function
    15·1 answer
  • A computer projecter is an example of a(n):<br> Input Device<br> Output Device<br> Storage Device
    12·2 answers
  • 16. A
    15·1 answer
  • 4.8.4 Better Sum
    15·1 answer
  • A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a singl
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!