1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga2289 [7]
2 years ago
9

………………….. is the process of causing a system variable to conform to some desired value. Options Control feedback Design none of

the above
Computers and Technology
1 answer:
frutty [35]2 years ago
4 0
Control <span>is the process of causing a system variable to conform to some desired value. Options Control feedback Design none of the above</span>
You might be interested in
Software that was designed to serve the needs of a specific company or organization is called:
devlian [24]
<span>Basically it's software tailor made to the companies needs and the specific name for this is integrated software</span>
3 0
2 years ago
question 5 you need to find the internet protocol (ip) address for a website. which command do you use on a windows system?
xz_007 [3.2K]

To find the internet protocol (ip) address for a website, the command that will be used is nslookup. The correct option is B.

<h3>What is nslookup?</h3>

A "network administration command line" program known as nslookup is used to learn about the Domain Name System (DNS) and to obtain the records for various domain names. It is mainly employed for DNS Server troubleshooting. Through domain names, we can access information on the Internet.

In the center of the Domain Name System are these names. Internet Protocol addresses are used by web browsers on the Internet to communicate with one another.

Therefore, the correct option is B, nslookup.

To learn more about nslookup, refer to the link:

brainly.com/question/14286524

#SPJ1

The question is incomplete. Your most probably complete question is given below:

A) Ipconfig B) Nslookup C) Ping D) Tracert

6 0
1 year ago
What does a break statement do
kolbaska11 [484]

The break statement in C programming has the following two usages − When a break statement is encountered inside a loop, the loop is immediately terminated and the program control resumes at the next statement following the loop. It can be used to terminate a case in the switch statement

8 0
3 years ago
What would happen to a eukaryotic cell if all its mitochondriawere destroyed
julsineya [31]
The cell won't reproduce ATP.
4 0
3 years ago
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
Other questions:
  • Binary code what does this mean I was sick so I don't under stand
    7·2 answers
  • Match each career with the education required for each job
    12·1 answer
  • To use the AutoCalculate area, select the range of cells containing the numbers for a calculation you want to verify and then pr
    7·1 answer
  • Arrange the steps below to outline what maia needs to do to accomplish this task.​
    9·1 answer
  • Identify which statement explains why a programmer would break a logic problem into steps.
    13·2 answers
  • Why are computers useful for modeling situations?
    13·2 answers
  • Siapa mahapatih brainly.com atau yg disebut Brainly Amerika Serikat ?​
    5·1 answer
  • State the functions of all the parts of the computer​
    14·1 answer
  • A data analyst adds descriptive headers to columns of data in a spreadsheet. How does this improve the spreadsheet?.
    8·1 answer
  • How does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!