1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kay [80]
3 years ago
7

Helpppppppppppppppppp

Computers and Technology
1 answer:
masha68 [24]3 years ago
8 0
Question 1. Is Size, Style and Color.
I believe Question 2 is font size, if that's an answer.
You might be interested in
What is the technological singularity and what are the dangers it brings to man
professor190 [17]
The definition according to google and the dictionary of technological singularity is the following : The technological singularity (also, simply, the singularity) is the hypothesis that the invention of artificial superintelligence will abruptly trigger runaway technological growth, resulting in unfathomable changes to human civilization.

The dangers this brings to man kind is the fact that people will turn out to not be people or there may be a different species considered as humans or human kind .Also we were made as humans from something else artificial super intelligence will basically be forming from us which means it will be forming from something that was already mean basically meaning there will be something changed within the species or artificial super intelligence itself.
3 0
3 years ago
Spanning Tree Protocol (STP) is a loop-prevention mechanism used in modern networks. STP is, however, vulnerable to misconfigura
maks197457 [2]

Answer:

Any of the following:

1. Root Guard

2. BPDU Guard

3. BPDU Filtering

Explanation:

Given that STP an acronym of Spanning Tree Protocol, and its major purpose is to stop the bridge loops and the broadcast radiation that emanates from its topology.

Cisco carried out three instruments or tools to protect the STP topology. These protection tools accompany the STP, and they are the following:

1. Root Guard

2. BPDU Guard

3. BPDU Filtering

3 0
3 years ago
You are designing a network for a client. As part of the design you need setup a Site to Site VPN solution to a Branch office. T
MaRussiya [10]

Answer:

The branch office needs to configured as a split tunnel to allow local connectivity and internet connectivity

Explanation:

Split tunneling is a computer networking concept which allows a network terminal to access different network domains or subnets like a public network  and a local network at the same time so that the networked system can access local as well as remote locations without changing the overall network configuration.  

5 0
4 years ago
Desktop and laptop computers require an operating system with a file __________ system that allows users to view and manipulate
Ludmilka [50]

Answer: Desktop and laptop computers require an operating system with a file __Management________ system that allows users to view and manipulate data files.​

3 0
4 years ago
Caleb is leading a project involving the use of natural resources, but his group is having problems finding its focus with such
g100num [7]

Answer:

problem-solving skills-overseeing group tasks-excitement about the project

Explanation:

8 0
4 years ago
Read 2 more answers
Other questions:
  • In the ____, or ad hoc, layouts configuration, there is no access point at the center of a cell.
    7·1 answer
  • Create an application that lets the user enter the food charge for a meal at a restaurant. When a button is clicked, the applica
    13·1 answer
  • Plot absorbance versus concentration in μmol/L of the Tartrazine solution at the wavelength of the maximum absorbance of Allura
    10·1 answer
  • Options to open, save, and print a document are found on which of the following tabs?
    9·2 answers
  • Knowledge management software helps companies preserve the knowledge gained through the use of information so that future users
    15·2 answers
  • A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web s
    13·1 answer
  • What is the value of the variable result after these lines of code are executed?
    11·1 answer
  • What is a computer modem?​
    9·1 answer
  • Where would you click to change the<br><br>Screen Saver?​
    10·2 answers
  • Why might a programmer want to define his or her own functions? What are some potential disadvantages? How might new functions m
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!