1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hunter-Best [27]
3 years ago
9

Whats my screen name?

Computers and Technology
2 answers:
adoni [48]3 years ago
8 0
It could be any thing of your chose
Reil [10]3 years ago
6 0
Vega59 why do u want to know tho
You might be interested in
How is it possible for the router to know whether it is supposed to send a cat photo to your laptop
kupik [55]

It is possible for the router to know whether it is supposed to send a cat photo to your laptop because  It uses the private IP address.

Router  is a  device that help to transfer data and across the internet or across the user device and the internet.

Private IP addresses are internet protocol addresses that is often  assign to user device by   router in order to a successful communicate to take place between the internet and user device.

Private IP addresses are mostly at:

•Home

•Office

•Business  environments

Inconclusion It is possible for the router to know whether it is supposed to send a cat photo to your laptop because  It uses the private IP address.

Learn more here:

brainly.com/question/19112414

3 0
2 years ago
What is the maximum ream size on an agile project?
yarga [219]

Most Agile and Scrum training courses refer to a 7 +/- 2 rule, that is, agile or Scrum teams should be 5 to 9 members. Scrum enthusiasts may recall that the Scrum guide says Scrum teams should not be less than 3 or more than 9

Explanation:

6 0
3 years ago
What is created for each user the first time the user logs onto windows?
Naddik [55]
<span>A profile is made the first occasion when that a client sign on to a Windows XP, Windows 2000, or Windows NT® Workstation–based PC. A client profile is a gathering of settings and documents that characterizes the condition that the framework loads when a client sign on. It incorporates all the client arrangement settings, for example, program things, screen hues, organize associations, printer associations, mouse settings, and window size and position. Profiles are not client arrangements and the client has a profile regardless of the possibility that you don't utilize Group Policy.</span>
4 0
3 years ago
You have many drugs that you want to store electronically along with their purchase dates and prices, what kind of software woul
Doss [256]

Answer:

Database

Explanation:

To store a variety of drugs electronically, along with displaying their purchase dates and prices, the kind of software that would be used is database.

5 0
3 years ago
What is the capture of transaction and event information using technology to (1) process the information according to defined bu
Tanya [424]

Answer:

OLTP(Online transaction processing)  is the correct answer.

Explanation:

It is the database application that is used to catching the transection and that data or information which is related to the technology for the purpose of.

  • Process that data and information which is related to the following rules of the business or company.
  • It stores the data or information related to the online transaction.
  • It also helps to modify the current data or information for the new data or information.
6 0
3 years ago
Other questions:
  • Select the correct answer
    11·1 answer
  • Where (what memory location) is the data read from for the following code:
    12·1 answer
  • What is the first step that you have to perform before you can add a windows package to a wim file?
    9·1 answer
  • You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Wind
    7·1 answer
  • Which of these are tools used to diagnose and test code? Check all of the boxes that apply.
    9·1 answer
  • Which tool ia used to create the world wide web?
    15·1 answer
  • Say true or false
    10·2 answers
  • A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy
    14·1 answer
  • quizlet ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks f
    6·1 answer
  • You work part-time at a computer repair store. You're building a new computer. The customer has requested two serial ATA (SATA)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!