1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
3 years ago
9

"what is the name of the ipsec configuration file"

Computers and Technology
1 answer:
kifflom [539]3 years ago
5 0
Ipsec.conf file. This file is found in the /etc/ directory
You might be interested in
List at least 5 professions for people working in the Information/Communication<br> fields.
MrRissso [65]

Answer:

telephone servicer, mobile phone servicer, televsion servicer, computer servicer, laptop servicer

5 0
3 years ago
Binary Numbers and Conversion 1. Complete the following decimal-to-binary number conversions. a) 17 (10) b) 34 (10) c) 58 (10) d
GaryK [48]

Answer:

a) 10001

b)100010

c)111010

d)1111100

e)1110111

f)10110010

g)100101001

h)110011101

Explanation:

7 0
2 years ago
What is algorithm and how does it works​
andre [41]

Answer:

An algorithm, for the non-programmers among us, is a <u><em>set of instructions that take an input, A, and provide an output, B, that changes the data involved in some way</em>.</u> Algorithms have a wide variety of applications. In math, they can help calculate functions from points in a data set, among much more advanced things.

Explanation:

hope it helps

5 0
2 years ago
Read 2 more answers
In the process of benchmarking for a variable expense (such as payroll) the typical metrics used are "Total Dollars" and "Dollar
gregori [183]

Answer: True

Explanation:

5 0
3 years ago
After separating from Mexico, Texas passed laws that made it harder for slave owners to _____________ slaves.
baherus [9]

Answer: b.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • In Florida, you can drive a motorcycle if you have a _____.
    8·1 answer
  • To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for
    6·1 answer
  • Consider the following code segment.
    15·1 answer
  • str1=”Good” str2=”Evening” Does the concatenation of the above two strings give back a new string or does it concatenate on the
    14·1 answer
  • Diane is receiving a lot of unwanted e-mail. What steps can she take to reduce the amount of e-mail she receives?
    12·1 answer
  • Convert 78 to binary
    6·2 answers
  • <img src="https://tex.z-dn.net/?f=6.372%20%5Ctimes%2075%20find%20the%20product" id="TexFormula1" title="6.372 \times 75 find the
    6·1 answer
  • Where does the list of incoming mail appear in gmail
    13·2 answers
  • State and give reason, if the following variables are valid/invalid:
    12·1 answer
  • Kris is the project manager for a large software company. Which part of project management describes the overall project in deta
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!