1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry [639]
3 years ago
6

Can someone please help me with the three questions please?

Computers and Technology
1 answer:
fomenos3 years ago
5 0
1. D, all of the above counts as communication
2. C, Domain Name Server translates domains into IP addresses
3. B, MAC addresses are physicall addresses of network interfaces
You might be interested in
For what reason can security risks never be fully eliminated?​
raketka [301]

Answer:

A vulnerability level of ZERO can never be obtained since all countermeasures have vulnerabilities themselves. For this reason, vulnerability can never be zero, and thus risk can never be totally eliminated.

Explanation:

also we need to be protected from scams and stuff

7 0
3 years ago
Propose a data structure that supports the stack push and pop operations and a third operation findMin, which returns the smalle
juin [17]

Answer: attached below

Explanation:

3 0
3 years ago
_________ local variables retain their value between function calls.
SOVA2 [1]

Answer: static

Explanation:

variables when declared static gets called statically meaning whenever a function call is made it get stored and it is not required to get the variable again when the function is again called. There scope is beyond the function block

4 0
3 years ago
Does any one have the computer science 2020 past paper for gcse ocr
valkas [14]

Nope those are quite rare but are found at qdoc.tips

6 0
2 years ago
What’s one trick you can use in Scratch to try to narrow down which block, among many, might be creating an error?
IRISSAK [1]

Answer:

Explanation:

They can be used in class or as homework based on teacher preference. The questions can reveal ... process multiple times are the building blocks of programs.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Peter is working on a project. He feels that the parameters need to be changed to meet the client specifications. First he must
    7·1 answer
  • Smart art and shapes are useful tools because they allow you to
    6·1 answer
  • 50 POINTS & A FOLLOW!
    11·2 answers
  • Front and rear camber and toe settings are being adjusted during a four-wheel alignment. The correct order for performing these
    13·1 answer
  • [1] Please find all the candidate keys and the primary key (or composite primary key) Candidate Key: _______________________ Pri
    6·1 answer
  • Which of the following is a web app?
    5·1 answer
  • What would a digitizing application create?
    13·2 answers
  • Lord Strawberry, a nobleman, collected birds. He had the finest aviary in Europe, so large that eagles did not find it uncomfort
    9·1 answer
  • Karen is designing a website for her uncle's landscaping business. She wants to ensure that it's engaging and provides a lot of
    5·1 answer
  • After turning on your computer ,it prompts you to type a password to continue the boot process. However ,you forgot the password
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!