1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MaRussiya [10]
3 years ago
7

Helpppppppppppppppppppppppppppppppppp plxxxxxxxxxxxxxxxxxxx

Computers and Technology
1 answer:
kobusy [5.1K]3 years ago
7 0
The answer is A.
because online recommendation engine is like consired as an data.
You might be interested in
Ideally, how often should you back up the data on your computer? once an hour, once a day, once a month, once a year. Please hur
Stells [14]

Explanation:

Every month or so

5 0
3 years ago
Read 2 more answers
Which best describes a difference between transcription and DNA replication
ruslelena [56]
DNA replication is just making a copy of someone or somethings DNA
6 0
3 years ago
Read 2 more answers
You have been instructed to connect a computer to a group of hosts that have been segmented from the regular network. What kind
san4es73 [151]

Answer: VLAN(Virtual local area network)

Explanation: VLAN(Virtual local area network) is the networking device that displays the flexible nature due to the logical connection of one or more LANs. VLAN is used for the purpose of the management, security, scaling etc.

VLAN also has the ability to provide the segmentation in the network by dividing the physical network into segments and making logical network. Router is the source for maintaining the communication in the VLAN.

Thus according to the requirement mentioned in the question ,VLAN is the network device that should be used.

8 0
3 years ago
Components that enhance the computing experience, such as computer keyboards, speakers, and webcams, are known as
never [62]

Answer:

- Peripheral devices

Explanation:

Peripheral devices are defined as computer devices which are not the element of the essential/basic computer function. These devices can be internal as well as external and are primarily connected to the computer for entering or getting information from the computer. For example, the keyboards or mouse functions to enter data into the computer for processing and receiving information while the output devices like speakers, projectors, printers, etc. are used to get the information out of the computer.

3 0
3 years ago
"what is the problem with using challenge handshake authentication protocol (chap) as an authentication protocol?"
Alexxandr [17]

Its use of the message digest 5 (MD5) hash algorithm for security.

CHAP uses a combination of MD5 hashing and a challenge-response mechanism, and authenticates without sending passwords as plaintext over the network. The security of the MD5 hash function is severely compromised.

5 0
3 years ago
Other questions:
  • The two variables causing the point of difference between the time codes are the frequency and the count
    6·1 answer
  • Which of these BEST describes an inference?
    11·2 answers
  • Productivity can best be described as:
    5·2 answers
  • Assume that an array of integers named a that contains exactly five elements has been declared and initialized. Write a single s
    15·1 answer
  • What are some examples of what can be changed through options available on the mini toolbar
    5·1 answer
  • Which Packet Tracer feature do you think will be most helpful for you in learning how to manage a network
    5·1 answer
  • 6. Python indexes lists beginning with the number 1.<br> True<br><br> False
    15·1 answer
  • In what way , if any, can your social media presence affect your chances of getting a job in social media?
    8·1 answer
  • Que papel tuvo la innovación en la propagación de la telefonía móvil?​
    7·1 answer
  • Software that converts program written in other language into machine language​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!