1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
13

11.

Computers and Technology
1 answer:
Svetllana [295]3 years ago
3 0
11. is battle of the bulge
12. rationing
13. trade embargo act
14. germany won the battle is not true
15. force jews to wear stars sown to their clothing to be caught without was punishable by death
You might be interested in
Who was responsible for unleashing the melissa computer virus
CaHeK987 [17]

Answer:

David L. Smith

Explanation:

Around March 26, 1999, the Melissa virus was released by David L. Smith

‘Melissa.A’ used social engineering techniques, since it came with the message “Here is the document you asked me for…  do not show it to anyone”. In just a few days, she starred in one of the most important cases of massive infection in history, causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

How it Works

When opening a document infected with the ‘Melissa.A’, the virus creates an e-mail with the following features:

Subject: Important Message From “sender name”

Text: Here is that document you asked for … do not show anyone else

Attachments: a file with a DOC.

The recipients of this message were the first 50 addresses ‘Melissa.A’ found in the address book in Outlook. This was the first macro virus that used this technique, until this moment there hadn’t been a virus that affected users by sending a Word document within an email.

What Happened

The creator of ‘Melissa.A’, David L. Smith, pleaded guilty but said he did not expect such high economic damage. This malware was created in memory of a topless dancer in Florida with whom he had fallen in love with.

Smith was sentenced to 10 years in prison.

6 0
3 years ago
All of the Internet in your country disappears. What happens next?
Talja [164]

Answer:

It is most likely that in a tech surrounded environment there would be an apacolypse, not necessarily a man hunting man apacolypse but it would cause a huge panic throughout that country because government could not communicate which is what leaves people with a safeplace.

Explanation:

please mark as brainliest xx hope it helps <3

if you really like this topic watch into the forest on netflix, it has the same premise except its not that internet disappears its electricity.

4 0
3 years ago
Which of the following functions automatically counts cells that meet multiple conditions?
vfiekz [6]

Answer:

c. countifs

Explanation:

The key word in the question is "following functions automatically counts cells".  So, you can already eliminate answer D.

With COUNTIFS, you can specify multiple criteria based on as many range for consideration.

For example, count this cell, if the value in column D is bigger than 23 <u>AND </u>if the date in column E is lower than June 30, 2019.

It gives great power of filter and calculation to your sheet, almost as good as a database.

4 0
3 years ago
You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to
lutik1710 [3]

Answer:

<em><u>D. The UTP cable does not support transmission distances of 75 feet without signal regeneration.</u></em><em> </em>

<em> is the </em><em>most</em><em> </em><em>likely cause of the connectivity problem</em><em>.</em>

Explanation:

hope it will help you

7 0
3 years ago
Provided you have an Internet connection and functional Web browser, gather information on three different commercial RAID contr
aalyn [17]

Answer:

1). Serial ATA (SATA): SATA drives are base hard drives. Serial ATA was designed to  replace the older parallel ATA (PATA) standard (often called by the old name IDE), offering several advantages  over the older interface: reduced cable size and cost (7 conductors instead of 40), native hot swapping, faster  data transfer through higher signaling rates, and more efficient transfer through a I/O queuing protocol. On  some systems without a controller, these can be cabled instead to the onboard SATA connections on the  motherboard. On smaller servers with a controller, they can still be cabled because these systems will not have  a backplane. Cabled hard drives are not hot swappable.

2). Near Line SAS: Near Line SAS are enterprise SATA drives with a SAS interface, head, media, and rotational  speed of traditional enterprise-class SATA drives with the fully capable SAS interface typical for classic SAS

drives. This provides better performance and reliability over SATA. Basically it is a hybrid between SATA and SAS.

3). Serial Attached SCSI (SAS): SAS is a communication protocol used in Enterprise hard drives and tape drives.  SAS is a point-to-point serial protocol that replaces the older based parallel SCSI bus technology (SCSI). It uses  the standard SCSI command set. These have extra connections through the top of the SATA connection. These  are the top end in performance for electromechanical drives.

4). Solid-State Drive (SSD): An SSD is a data storage device that uses integrated circuit assemblies as memory to  store data persistently. SSD technology uses electronic interfaces compatible with traditional block  input/output (I/O) hard disk drives. SSDs do not employ any moving mechanical components, which  distinguishes them from traditional magnetic disks such as hard disk drives, which are electromechanical  devices containing spinning disks and movable read/write heads. Compared with electromechanical disks, SSDs  are typically less susceptible to physical shock, are silent, and have lower access time and latency. Typically  because of these features, SSD drives can be the fastest I/O in the market today in standard hard drive form factor.

Explanation:

5 0
4 years ago
Other questions:
  • Email applications can either be local email client programs or web-based applications. Which application is an example of a loc
    13·2 answers
  • If you turn your volume to loud on u'r headphones can it break the sound quality of the speaker?
    9·2 answers
  • Kylie has created some code designed to keep track of information about employees at a company. The code will be used by the com
    6·1 answer
  • Yesterday you installed a new game on your computer. When you ran the computer, you noticed that the application was running ver
    15·1 answer
  • Consider five wireless stations, A, B, C, D, and E.
    13·1 answer
  • A professional bureaucracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of p
    7·1 answer
  • A network administrator manages a network with 75 servers. At least twenty of those servers are approaching end of life but the
    8·1 answer
  • A new company has proposed a number of different cache layouts for their system and you’ve
    10·1 answer
  • Do these devices allow you to view photos using the cloud?
    10·1 answer
  • What is the password based off of the clues
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!