1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
14

Identify the data link trailer blocker

Computers and Technology
1 answer:
IRINA_888 [86]3 years ago
7 0
What are ur possible answers
You might be interested in
Which is the best description of a computer virus?
MatroZZZ [7]
The best description of a computer virus is. Someone first starts out making a malicious program, then can send it to a unexpected user. After that, when the user opens the malicious program, it can do negative things on the target. The virus first starts out in the system32, then infects a random file type for example, exe files, or dlls etc. Then random errors can pop up on the computer saying "YOUR COMPUTER IS UNDER RISK! CALL THIS NUMBER NOW! 555-555-5555" and the options of the error, can direct you to a website, that can give you another virus. To get rid of a virus, you have to ignore the popups that comes onto your computer, and get a strong antivirus like avast, or avg. Then let it scan the system. After when the scan is done, it will show up the virus, and it will give you options "to delete virus or ignore it" you would hit delete. I hope this answer helped you. Let me know if you have any more questions! Thanks!
6 0
3 years ago
Read 2 more answers
Which of the follow is the best technique to determine how many menu items are needed and how to structure the menus and sub men
AnnZ [28]

Answer:

c. ​Group use cases by actor.

Explanation:

A use case is used to describe interaction between systems and users to achieve a goal. Mostly, a list of possible interaction between the system and the user is identified. The user can be a single person or a group. By using use case, the requirement of a systems is identified from a users point of view.

8 0
3 years ago
Define the _make method, which takes one iterable argument (and no self argument: the purpose of _make is to make a new object;
Ksenya-84 [330]
This picture will show you the answer and guide the way to victory

7 0
3 years ago
Pls answer thank you​
Sav [38]

Answer:

That would be your opinion

5 0
2 years ago
Mail is an important method of __________ between a company and it outside world.
Ipatiy [6.2K]

I would guess communication, but I might be wrong.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Common icons found on the Windows desktop are _____.
    6·2 answers
  • Help asap. 10 points.
    8·2 answers
  • ____ are systems in which queues of objects are waiting to be served by various servers
    5·1 answer
  • Explain the purpose of Data Layer, in the Layered modelfor web applications?
    6·1 answer
  • When evaluating portable CD players, you consider price, the sound quality, and ease of using the controls. These are your _____
    8·2 answers
  • You want to securely erase data from your hard drive what can you use to do this and what is the process called
    12·2 answers
  • Which of the following is the fastest growing input technique​
    14·1 answer
  • What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.e
    9·1 answer
  • The process of learning by making mistakes and by trial and error is called _____.
    6·1 answer
  • To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!