1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
2 years ago
14

ASAP 50 POINTS

Computers and Technology
1 answer:
s344n2d4d5 [400]2 years ago
4 0

Answer:

front end fire wall

Explanation:

You might be interested in
Oliver’s night job at the university computing center is to change the tapes used for overnight data backups on the server. Whil
densk [106]

Answer:

Explanation:

Ollie’s thesis may not be backed up as reliably as he might wish. A backup program may pass over a file that is currently open for writing, as the state of the data in such a file may be indeterminate.

4 0
3 years ago
[Assembly Language]Extended Subtraction Procedure.Create a procedure named Extended_Sub --(Receives: ESI and EDI point to the tw
alex41 [277]

Answer:

Modern (i.e 386 and beyond) x86 processors have eight 32-bit general purpose registers, as depicted in Figure 1. The register names are mostly historical. For example, EAX used to be called the accumulator since it was used by a number of arithmetic operations, and ECX was known as the counter since it was used to hold a loop index. Whereas most of the registers have lost their special purposes in the modern instruction set, by convention, two are reserved for special purposes — the stack pointer (ESP) and the base pointer (EBP).

For the EAX, EBX, ECX, and EDX registers, subsections may be used. For example, the least significant 2 bytes of EAX can be treated as a 16-bit register called AX. The least significant byte of AX can be used as a single 8-bit register called AL, while the most significant byte of AX can be used as a single 8-bit register called AH. These names refer to the same physical register. When a two-byte quantity is placed into DX, the update affects the value of DH, DL, and EDX. These sub-registers are mainly hold-overs from older, 16-bit versions of the instruction set. However, they are sometimes convenient when dealing with data that are smaller than 32-bits (e.g. 1-byte ASCII characters).

When referring to registers in assembly language, the names are not case-sensitive. For example, the names EAX and eax refer to the same register.

Explanation:

5 0
3 years ago
On tablets and smartphones, what feature can be used that can erase the contents of the device if lost or stolen?
jok3333 [9.3K]
It all depends on the brand of phone to do it yourself but, you can call your cell company and they can do it for you through your account.
3 0
3 years ago
According to symbolic interaction theory, the internet has helped to remove:
DanielleElmas [232]

Answer:

According to symbolic  interaction theory, the internet has helped to remove:

(D) Time and space barriers.

Explanation:

  • The symbolic interaction theory is such theory which explains that language and symbols are the means of interaction in the social worlds. This theory tells us about the relationship between people in a society.
  • The option a is not correct as the internet has not remove the subculture rather it has provided safe space to it. Sub-culture refers to a group of special interest like group of a biker. Anyone can create their community on the internet.
  • The option b is also incorrect as internet has not remove interpersonal communication rather it has speed up this communication. It is a type of communication in which people communicate with each other via their expression of feelings, verbal and non-verbal means.
  • The option c is also incorrect as the inappropriate content has removed by internet rather now everyone can create content. But regulations and guidelines are being made. A lot of work has been to be done in this area.
  • The option d is correct as the internet has helped to remove the barriers of time and space. It has made this world a global village now anyone from any part of the world can talk to any person to other part of the world over the internet. They can create communities depending upon their interests. They can do business and many other things.
5 0
3 years ago
Are chairs and tables considered technology?<br> A) true<br> B) false
Mashcka [7]

Answer:

true

Explanation:

this is true because technology is anything that is ment to help mankind. chairs and tables help people. something as simple as the wheel, or shows is also technology.

5 0
3 years ago
Read 2 more answers
Other questions:
  • 1. The goals of the Safety Office of the Department of Transportation include______.
    8·1 answer
  • Which are the two alternatives for pasting copied data in a target cell or a group of cells ?
    13·2 answers
  • The part of the computer that contains the brain or central processing unit is also known as
    9·2 answers
  • Are scripted languages easier or more difficult to port than programming languages? Why?
    6·1 answer
  • What problems have arisen regarding use of the Internet for global business transactions, and how are they being resolved?
    15·1 answer
  • A company operates on two types of servers: 2 large servers (L) and 4 smaller servers (S), with a combined total of 64GB RAM. Th
    9·1 answer
  • Which of these statements regarding mobile games is true? A. They are typically played indoors. B. They have detailed environmen
    15·2 answers
  • Write a function in Java to implement the following logic:
    13·1 answer
  • Which federal legislation prohibits credit card companies from raising rates on existing balances?
    10·2 answers
  • Choose which statement is wrong by applying your knowledge from the reading. a. A security manager works on tasks identified by
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!