1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Studentka2010 [4]
4 years ago
6

What is the answer to this question on the thing I'm doing in apex

Computers and Technology
1 answer:
frosja888 [35]4 years ago
5 0
I would say C and D. that's just a personal answer though.
You might be interested in
Utility software includes which of the following ? <br> Select all that apply
svet-max [94.6K]

Answer:   Utility programs, commonly referred to as just "utilities," are software programs that add functionality to your computer or help your computer perform better. These include antivirus, backup, disk repair, file management, security, and networking programs.

Explanation:

7 0
3 years ago
What type of attack is dependent on sending packets too large for the server to handle?
Art [367]
I think the answer is a kernel attack. Kernel attacks often send corrupted packets, but they also send large packets, allowing the server to crash and make an opening.
7 0
4 years ago
Lamp is an acronym for a complete solution of open source software that goes together to build a general purpose web server. whi
Westkost [7]
Answer choices?

LAMP contains <span>Linux, Apache, MySQL, and PHP.</span>
3 0
3 years ago
Which of the following is not a characteristic of Web 2.0?
Dmitry [639]

Answer:

c. mentorship programs taking place via the internet

Explanation:

The World Wide Web (WWW) was created by Tim Berners-Lee in 1990, which eventually gave rise to the development of Web 2.0 in 1999.

Web 2.0 can be defined as a collection of internet software programs or applications which avails the end users the ability or opportunity to share files and resources, as well as enhance collaboration over the internet.

Basically, it's an evolution from a static worldwide web to a dynamic web that enhanced social media. Some of the examples of social media platforms (web 2.0) are You-Tube, Flickr, Go-ogle maps, Go-ogle docs, Face-book, Twit-ter, Insta-gram etc.

Some of the main characteristics of Web 2.0 are;

I. Social networking.

II. Blogging.

III. Interactive comments being available on many websites.

Also, most software applications developed for Web 2.0 avails its users the ability to synchronize with handheld or mobile devices such as smartphones.

However, mentorship programs taking place via the internet is not a characteristic of Web 2.0 but that of Web 3.0 (e-mentoring).

7 0
3 years ago
Are DHCP messages sent over UDP or TCP? 2. What is the link-layer (e.g., Ethernet) address of your host? 3. What values in the D
maks197457 [2]

Answer:

1.) DHCP is sent over the message at UDP.

2.) The address of link-layer is Source: DellComp_4f:36:23 (00:08:74:4f:36:23)

3.) The message type of value to the discover message is 1, but the message type of value to the request packets is 3. This how you can be differentiate two.

4.) The Transaction ID in first four message is 0x3e5e0ce3

The transaction ID in second sets of messages is 0x257e55a3

The transaction ID is identifies if the message is a part of the set of the messages is related to the one transaction

Explanation:

DHCP is stands for the Dynamic Host Configuration Protocol which is the networks management protocol that is used on the UDP/IP networks where by the DHCP servers dynamically assign the IP address and the other networks configuration parameters to the each devices on the network so they can be communicate with the other IP network.

6 0
4 years ago
Other questions:
  • Why is Copyright important?
    5·1 answer
  • Write a program named convertdate that converts a date entered by the user into another form. the user's input will have the for
    8·1 answer
  • Which two men developed the steam engine?
    8·1 answer
  • A Color class has a constructor that accepts three integer parameters: red, green and blue components in the range of 0 ... 255
    6·1 answer
  • Which function in the plane manager allows you to create a new plane where both x and y axes are perpendicular to the line selec
    14·1 answer
  • Karen wants to create a program that will allow the user to input their age. Which of these lines of code should be used?
    11·1 answer
  • A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
    8·1 answer
  • Please can someone help my assignment.​
    13·1 answer
  • Why, during the final stage of the multistage model for e-commerce, is comprehensive customer information captured in the suppli
    7·1 answer
  • E. Write an algorithm to show 'How to prepare a cucumber sandwich?". ​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!