1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
3 years ago
7

Pix blocks półfinały skilled

Computers and Technology
1 answer:
jasenka [17]3 years ago
6 0

mam  ,,4 6 7 12 15 .18.20.

You might be interested in
Paragraph: Read the following two e-mail messages. In three to five sentences, explain why E-mail B is the more appropriate work
exis [7]
E-mail B is the more appropriate workplace e-mail because it’s straightforward, polite, and professional. E-mail A was more accusatory and aggressive, and many people don’t like when they’re being yelled at or accused of something and, as a result, this person may start to dislike that coworker. However, the second e-mail was more polite and made the receiver think of them as a respectful person so that they’re happy to help them out.
4 0
4 years ago
Explain the term computer output​
fomenos

Answer:

Computer output simply put is any data generated by the computer or feedback gotten from the computer. Output can take many forms, but there are 2 major categories:

- Soft copy output e.g text viewed on a computer screen

- Hard copy output e.g printouts

Explanation:

6 0
3 years ago
Which is true about SSH and Telnet?
MaRussiya [10]

Answer:

Data is encrypted on SSH

Explanation:

Telnet and SSH both are the networking protocols. These protocol are used for the security of data. In telnet data is sent over the link without any encryption. That is the reason, in telnet protocol data is less secure.

In SSH (Security Shell) protocol data has been encrypted before transmission. The encryption of data make it more secure between transmitter and receiver.

So the true statement is that, SSH has data encryption.

8 0
3 years ago
When you write contracts, should you list many definitions at the start of the document?
aev [14]

Answer:

You can.

Explanation:

If you want you can, but usually as you cover topics you should list the definitions for each topic then instead of all at the beginning you do not want it to seem like it is a lot.  

4 0
3 years ago
The tcp/ip ____ layer commonly uses the transmission control protocol (tcp) to maintain an error-free end-to-end connection.
aleksklad [387]
The answer would be the TCP/IP Application Layer.
6 0
3 years ago
Other questions:
  • Which type of programmer designs programs for applications executed on the internet?
    10·1 answer
  • Explain the concept of an engineering trade-offs and give an example
    6·2 answers
  • Arrays are described as immutable because they are two dimensional. are arranged sequentially. can be reordered. cannot be chang
    13·1 answer
  • Relation between training and occupation with examples in points . Plz tell fast<br> ​
    5·1 answer
  • Why won't Brainly let me send a link? This is just du*mb! I want to send good articles explaining a content, and this site just
    5·1 answer
  • A computer technician is responding to a call about a printer that is causing streaks to appear on every printout. Which of the
    5·1 answer
  • 14. For the declaration, int a[4] = {1, 2, 3};, which one is right in the following description-
    12·1 answer
  • What is the term used to describe the basic unit of data passed from one computer to another
    14·1 answer
  • How to make a 'Sign in with replit' button in replit (Node.js) will make brainliest
    12·2 answers
  • Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!