1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
3 years ago
6

Select the correct answer.

Computers and Technology
1 answer:
vovangra [49]3 years ago
8 0

Answer:

B.

Learn from both successful and unsuccessful logos.

You might be interested in
Many web browsers include _________ tools to make it easier for designers to locate the source of a style that has been applied
nordsb [41]

Answer:

c. developer

Explanation:

DEVELOPER TOOLS are tools that enables designers to easily and quickly edit web page and as well diagnosed issues or problem on a website which will inturn enables them to build a great and better websites without stress reason been that when a designer makes use of DEVELOPER TOOLS they can quicky track down and as well fix the problem that was diagnosed within a minute or seconds thereby saving time when developing a website profile.

8 0
3 years ago
A network administrator enters the command ipv6 router ospf 110 in global configuration mode. What is the result of this command
Zepler [3.9K]

Answer:

The OSPFv3 AS number will be assigned an ID of 110

Explanation:

If we don't have ipv4 addressing previously, we are going to assign the router-id manually.

We are going to receive a message about the assignation manually.

We can assign a router-id with the next line:

#router-id 1.1.1.1

If we already have the ipv4 addressing, the router going to assign the router-id automatically.

4 0
3 years ago
Draw a project network from the following information. What activity(ies) is a burst activity? What activity(ies) is a merge act
Effectus [21]

The answer & explanation for this question is given in the attachment below.

5 0
3 years ago
Configure password settings so that the user must: ________________
eduard
I think the correct answer is C hope this helps
6 0
3 years ago
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
4 years ago
Other questions:
  • Dave has to create animations for a game. Which tool can Dave use?
    9·2 answers
  • Once you have selected the range of cells for your table data, from which tab can you open the Insert Table dialog box?
    6·2 answers
  • A software architecture that divides an application into view, business logic, and data is called a(n) ________.â
    14·1 answer
  • Below is a recursive implementation of the factorial function. For what value of n will this function not produce the desired re
    8·1 answer
  • Which of the following characterizes how an enabled security program might react to a new program installation on a computer sys
    7·2 answers
  • What is an example of value created through the use of Deep Learning?​
    12·2 answers
  • Can you move it like this? I can shake it like that
    6·1 answer
  • How to get amount after a percentage increase in excel​
    8·2 answers
  • Match the vocabulary to the appropriate definition.
    13·1 answer
  • A cpu converts the data entered through the keyboard into output displayed on the monitor. True or false?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!