1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
7

This activity will help you meet these educational goals:

Computers and Technology
2 answers:
nirvana33 [79]3 years ago
8 0

Answer:

you are doing research for configuration processors.

Explanation:

Serga [27]3 years ago
7 0

Answer:

research

Explanation:

You might be interested in
Select the best answer from the drop-down menu. ________ networks use cables connected directly to the computer. Signals sent in
LekaFEV [45]

Answer: Wired, Wi-fi, Wi-fi, A wired network, Wi-fi

Explanation:

4 0
3 years ago
A customer in Lowe's needs help. Matt works in shipping and receiving. It isn't Matt job to work with the customer, but he knows
klio [65]

Answer:

40

Explanation:

hhhhhjjjj

5 0
3 years ago
Read 2 more answers
Character literals are enclosed in ________; string literals are enclosed in ________. Group of answer choices double quotes; do
adelina 88 [10]

Answer:

Single quotes; Double quotes

Explanation:

Character literals is a type of literal in Java programming used for denoting constant valued character. Examples are 'g', '6', 'A' '+' etc.

String literals is a type of literal in Java programming used for representing or displaying of a sequence of characters or string values. Examples are "Hello Brainly user"

In Java programming, Character literals are enclosed in single quotes, string literals are enclosed in double quotes.

7 0
3 years ago
An organization is looking to add a layer of security by implementing a solution that protects hosts against known and unknown m
klio [65]

Answer: D) Whitelisting

Explanation:

Whitelisting are used in many applications and it only allows the good known apps. Whitelisting are majorly used for security purpose as, it permits to maintain or control the misuse the apps by employees in an organisation.

Blacklisting maintain the list of denied access system and it prevented the accessing undesirable program. It is also used as security application but it is less effective than whitelisting.

Encryption are the process which are not used in the restricting application. And lockout are used by the users for entering the password for many time as possible.  

Therefore, option (A) is correct.

4 0
3 years ago
Show the output waveform of an AND gate with the inputs A, B,
NeX [460]

Answer:

Please see the attached image

Explanation:

6 0
3 years ago
Other questions:
  • What effects will the different types of lighting produce on mountains?
    15·1 answer
  • Operating systems are designed to work with specific hardware. Which operating system works with Apple computers?
    8·2 answers
  • Write a program that asks the user to enter a birth year. the program should then indicate which generation a person of that yea
    14·1 answer
  • Consider sending a 10000-byte datagram into a link that has an MTU of 4468 bytes. Suppose the original datagram is stamped with
    10·1 answer
  • The chemical symbol H represents which of the following elements?
    9·2 answers
  • It is safe to stand on the top step of a ladder provided it is braced property
    10·1 answer
  • How do you put a voice password on your computer using windows 10
    14·1 answer
  • Janet received an email from a bank asking for the password for her Internet banking account. She emailed back her password. A f
    12·2 answers
  • Plz subscribe my yt gaming channel <br>FIREAZZ GAMING​
    8·2 answers
  • Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!