1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tester [92]
1 year ago
15

9

Computers and Technology
1 answer:
Aleks04 [339]1 year ago
5 0
I think c is correct
You might be interested in
You have decided to install the DNS server role on Nano Server. What specific type of zone configuration is not supported when u
nadya68 [22]

Answer:Active Directory-integrated

Explanation: Active Directory-integrated is the service that is introduced by the Microsoft .This service provides the directory form for functioning in Windows. It serves the purpose of active directory(AD) transferring to the Dynamic web database. Whenever the user gets connected to any website, it provides validation to qualifications . So, it does not get support the specification when there is working of DNS.

4 0
3 years ago
Help! What is this graph and what does it represent?
Lunna [17]

Answer:

Explanation:

how much something had in each month in this graph

7 0
3 years ago
Which is the order of steps for attaching an item to a contact?
aivan3 [116]
We need to know what item and then we can answer ur question
5 0
3 years ago
Read 2 more answers
Which wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
Korolek [52]

Answer:

WEP, WPA Personal, and WPA2 personal, these are the wireless security method which are used common shared key configured on the wireless access point and wireless clients. WEP is the wired equivalent privacy and WPA stands for wifi protected access.

These are the wireless security protocols, which basically provide the wireless security to the system. Wireless network are transmitted within the range for every direction. WPA modern application used the pre shared key system and this system are developed for link the device to the access point easily.

4 0
3 years ago
What function would be used if you want to compare all other rows with the first row?
tester [92]

Answer:

B

Explanation:

the person at the very top said so :)

6 0
3 years ago
Other questions:
  • Katie created a web site that automatically scales to fit a cell phone. What kind of design did Katie use?
    12·2 answers
  • The project manager of a software development team needs to hire someone to review every part of the software to make sure it wo
    7·1 answer
  • In the Word 2016 window, where is the Status bar located?
    8·1 answer
  • Explain how software is distinct from hardware.
    8·2 answers
  • How do you write the slope-intercept form?
    5·1 answer
  • Which of the following statements is not correct ​
    6·2 answers
  • Which part of the operating system enables you to interact with the device? Question 9 options: The graphical user interface The
    8·1 answer
  • Which element of a presentation program’s interface displays the slide you are currently creating or editing?
    14·2 answers
  • Which task can a company perform with intranets
    8·1 answer
  • Write a menu-based program in C++ for an input restricted dequeue using Linked List consist of
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!