1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry [639]
3 years ago
7

Please answer these questions! Will mark Brainliest!!

Computers and Technology
1 answer:
Sergio039 [100]3 years ago
7 0

Answer:

1) bob behnken and doug hurley

2)yes

3) august

You might be interested in
Seth would like to make sure as many interested customers as possible are seeing his business’s website displayed in their searc
GenaCL600 [577]

Answer:

Hi! Make sure that the website has a few things. Proper Keywords, the pages have the proper tags, a form on the website, contact information, CIty State, Etc., Then a phone number. Social media icons that link properly to the social media pages.

Explanation:

5 0
3 years ago
Nearly all social software systems include a(n) ________, which helps control your information flow.
Alekssandra [29.7K]

Answer:

dashboard

Explanation:

4 0
2 years ago
Read 2 more answers
Protocol 2 - Check for Errors
Lapatulllka [165]

Please note that the Problem to be solved from Protocol 1 is not provided hence the general answers. To construct and send, open a network environment a single multi-packet message, simply click "Add Packet" and then click "Send at Once".

<h3>How will the receiver know the order of the packets or if any are missing?</h3>

If the text or message sent does not make any reading sense, or if certain words are jumbled and out of place, then it is clear that something is wrong.

If the messages arrive in a coherent fashion, then the packet was fully received.

<h3>How will the receiver request missed packets and what will the sender do in response?</h3>

Where the users are familiar with the Transmission Control Protocol, lost packets can be detected when there is a timeout. Lost packets are referred to as Dropped packets.

Learn more about Packets at:
brainly.com/question/17777733

7 0
2 years ago
What is the first step in devising security services and mechanisms?
N76 [4]

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

4 0
3 years ago
Read 2 more answers
What language is used to write software that instructs computers to take certain actions?
EleoNora [17]

Answer:

C Programming language.

Explanation:

  • A scripting language is a type of programming language, so D cannot be correct.
  • A markup language is a way to edit documents, so A cannot be correct.
  • An indexed language refers to linguistics and is thus irrelevant.
8 0
3 years ago
Read 2 more answers
Other questions:
  • In 125 words describe the steps to active listening.
    6·1 answer
  • Which of the following is a narrative essay most like?
    10·2 answers
  • Evolution of computers
    13·2 answers
  • Which of these is an aggregator?
    9·2 answers
  • write a function that given an integer Y and 3 non-empty string A,B,W, denotingthe year of vacations, the beginning month, the e
    5·1 answer
  • Njdnkjsdnjvnsdjvnjsdnvjsdvnjdnvjdsnvnksn
    6·1 answer
  • Your it department enforces the use of 128-bit encryption on all company transmissions. your department also protects the compan
    13·1 answer
  • 1) which of the following is not a characteristic of valuable information?
    8·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    12·1 answer
  • A DTP firm has published and printed fliers for an upcoming fundraising event. In which section of the flyer would you find the
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!