1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
12

Select the correct answer.

Computers and Technology
2 answers:
Anastasy [175]3 years ago
5 0

Answer:

B:Flexability

Explanation:

He wants some one flexable so they fit in with the schedule and jobs he has for the employee

Ad libitum [116K]3 years ago
4 0
The answer is B. Flexibility
You might be interested in
1.What is aperture priority mode? When might you use this mode on a camera?
miss Akunina [59]

The answers are too long. I have compiled them in Word and attached them below.

Download docx
8 0
3 years ago
Which of the following are ways that
Viefleur [7K]

Answer:

A and b

Explanation:

3 0
3 years ago
True/False: Software engineering is a field that encompasses designing, writing, testing, debugging, documenting, modifying, and
Natali [406]

Answer:

The answer is "True".

Explanation:

The software engineering is the mechanism by which end-user programs are evaluated and planned, to built and reviewed, and fulfill these needs by using language software programming.

  • The fundamental goal of software engineering is to design software, that uses the techniques and processes, that are applied to make large systems and frequently used to produce quality applications.
  • It is also used in modifying and maintaining software.

7 0
3 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
Fill in the blank. THANK YOUU
Svetllana [295]

Answer:

She's procrastinating

Explanation:

3 0
3 years ago
Other questions:
  • HELP PLEASE!!!!!!!!
    10·1 answer
  • As an alternative to using the Color button on the PICTURE TOOLS FORMAT tab to display the Color gallery, you can right-click th
    9·1 answer
  • What are the details of frame transmission andreception that LAN interface handles?
    7·1 answer
  • The is a blinking vertical line that indicates where the next typed character will appear
    12·1 answer
  • What are some pros for having your phone during school hours?
    10·2 answers
  • Computer software that brings together sound, video, graphics, animation, and text and adjusts content on the basis of user resp
    7·1 answer
  • Which of the following are TRUE? A function can call another function. As long as the function is defined anywhere in your progr
    14·1 answer
  • Can you adopt me in the orphanage u saw Tammy after school?
    7·1 answer
  • In two to three sentences, define "home row" and explain why it is important.
    6·2 answers
  • Q.3.1 Explain why devices on a network need addresses. (5)​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!