1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
7

What should you do to protect your copyright

Computers and Technology
1 answer:
enot [183]3 years ago
5 0
The answer is Register your work
You might be interested in
Write a JavaScript program to generate the following pattern but the number of rows should be user input.
Nookie1986 [14]

Answer:

Testicles

Explanation:

u sukkk

3 0
3 years ago
How do u set up a Wi-Fi network on Android ​
AlladinOne [14]

Answer:

These are some way I know

5 0
3 years ago
Who designed the Analytical Engine in the 1830s? Alan Turing Alan Turing Charles Babbage Charles Babbage Bill Gates Bill Gates S
Dmitriy789 [7]
Charles Babbage Charles Babbage
7 0
2 years ago
hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?
aalyn [17]

Answer:

ICMP.

Explanation:

Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.

ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.

3 0
3 years ago
During a move, employee workstations were disconnected from the network and reconnected in new offices. However, after the move
Troyanec [42]

Answer:

Make sure the cables are functional and properly plugged.

Explanation:

For the fact that everything was working perfectly before the move, but after the move, it was noticed that a few workstations cannot get a valid IP, the first thing that is required to be checked is to ensure that the cables are properly plugged, and if they are, make sure that you test for the functionality of the cables. It is only after these checks and the problem persist, that further troubleshooting is required.

5 0
3 years ago
Other questions:
  • School computer labs are used often to teach technology skills or subject-specific skills ____ the rest of the curriculum.
    11·1 answer
  • Which directory in the FHS stores programs and configuration information that can only be executed and modified by the root user
    10·1 answer
  • The purpose of a lockout tagout checklist is to​
    9·2 answers
  • What feature new to Windows Server 2012 provides the ability to find identical sets of data on a SAN based storage array and red
    14·1 answer
  • What does intergrated organization mean
    15·1 answer
  • Do the shape of a sign gives you a clue about the information contained on the sign
    7·1 answer
  • Which procedure is used as a physical barrier to secure data against unauthorized access in a cloud storage data center?
    6·1 answer
  • Which guideline should you follow when selecting the font for a presentation
    9·1 answer
  • What is Automation ? Please give an example ?
    14·1 answer
  • What is the process called when programmers look for and fix errors in code? Analysis Debug Document Error check
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!