1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
3 years ago
12

(tco 7) the .net framework class library consists of ________ that provide many of the functions that you need for developing .n

et applications
Computers and Technology
1 answer:
Andre45 [30]3 years ago
5 0
Code, which makes it work.
You might be interested in
I love the brainly update guys! :)
earnstyle [38]

Answer:

you mind if i take these points?

Explanation:

3 0
2 years ago
Read 2 more answers
BitTorrent, a P2P protocol for file distribution, depends on a centralized resource allocation mechanism through which peers are
ch4aika [34]

Answer:

yes. it is true. mark as brainlest

8 0
2 years ago
What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
snow_tiger [21]
The recommended secure protocol for voice and video applications is the Secure<span> Real-time Transport </span>Protocol<span> (SRTP) protocol. SRTP is a Real-time Transport </span>Protocol (RTP) profile used to  to provide encryption, message authentication and integrity.
The default cipher of SRTP is the Advanced Encryption Standard<span> (AES) .</span>
8 0
3 years ago
Which of the following describes ETL? a) A process that transforms information using a common set of enterprise definitions b) A
andrezito [222]

Answer:

The correct answer is d) All of these are correct.

Explanation:

ETL stands for Extract, Transform and Load. An ETL system extracts data from the sources, enforces data quality and consistency standards, conforms data so that separated and maybe unrelated sources can be used together, and as a final step delivers data in presentation-ready formats so that developers can build applications and end users can take decisions.

4 0
3 years ago
What word describes a violation of copyright laws? What rights do copyright holders have over their work of art
lesya [120]

breech

malefaction

misdoing

offence

transgression

8 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following would likely be covered under homeowners insurance but NOT by renter's insurance?
    9·2 answers
  • Which of these sites would need additional investigation to check for reliability?
    8·2 answers
  • What is hyper transport
    10·1 answer
  • A(n) ______ system is a set of programs that coordinates all the activities among computer or mobile device hardware. a. managem
    10·1 answer
  • According the Keown book, which Web-based personal financial planning website is known as "the best free way to manage your mone
    6·1 answer
  • Which elements of text can be changed using automatic formatting? Check all that apply.
    8·1 answer
  • Did anyone do 5.7.5 Factorial on Code HS??<br><br><br><br> 20 POINTS
    9·1 answer
  • 1. What are you going to do if someone ask for your personal information online?​
    12·2 answers
  • After reading his e-mail messages, Orlando became very frustrated. Many of the messages he received did not conform to netiquett
    6·1 answer
  • The computer stores currently used programs and data in ________.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!