Internet addresses are controlled by which one of the following protocols?

A. TCP
B. IP
C. UDP
D. HTTP (Hypertext Transfer Protocol)


Answer: B

Computer Science & Information Technology

You might also like to view...

Which type of firewall configuration protects public servers by isolating them from the internal network?

A. screened subnet DMZ B. dual-homed host C. screening router D. reverse firewall

Computer Science & Information Technology

The ____________________ at the bottom of the screen includes applications buttons and the notification area.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is TRUE about cropping an image?

A) The crop pointer is the key used to delete portions of an image. B) The portion of the image to be removed displays in black. C) The portion of an image that is to be removed displays in gray. D) The portion of an object to be deleted displays as light red stripes.

Computer Science & Information Technology

Place the following OSI model layers in the correct order from layer 1 to layer 7

Application Data link Network Physical Presentation Session Transport

Computer Science & Information Technology