1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariulka [41]
3 years ago
14

unscramble the letters to identify which step of the scientific method each statement repesents why is the sliced cheese in the

fridge all moldy bemoplr
Computers and Technology
1 answer:
Rudiy273 years ago
5 0
Sorry the only word I could get from that is problem, is that possibly the answer?
You might be interested in
When you start to type =av, what feature displays a list of functions and defined names?
MAXImum [283]
The feature displays a list of functions and defined name, but after you start to type = av and it will begin typing an formula. Formula AutoComplete is the defined name will come up in the screen. Formula AutoComplete is also called the word completion it is a feature that predicts the remaining part of the word a user is typing.
3 0
4 years ago
Which descriptions offer examples of Correction Services workers? Select all that apply.
lutik1710 [3]

B.) Doug supervises Jailers and makes sure their work meets standards.

E.) Rudy monitors people who are on probation and parole.

F.) Nancy guards inmates in a prison.

4 0
3 years ago
Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust serve
klio [65]

Answer:

The answer is "Option A and Option B"

Explanation:

This is a type of attack, which is mainly used to bring down a network or service by flooding large amounts of traffic. It is a high-rate server from legitimate sources, where an attacker or group of zombies is attempting to drain server resources by creating and disconnecting the TCP link, and wrong choices can be described as follows:

In option C, It can't initiate a single request because when the servers were overloaded with legitimate source links, the hacker may then set up and uninstall TCP links.

7 0
3 years ago
Today you turned on your computer after being on vacation for a week. You see spinning white dots on a black screen. You decide
inn [45]

Since after update of operating system patches the end user see dots in black screen, either end user has to restore operating system old back up if he or she has or boot the operating system in safe mode.

<u>Explanation:</u>

On safe mode end user can repair the operating system; in repair mode still operating system cannot repair the operating system on same safe mode uninstall patches or recent updates of operating system during vacation.

Still it is workstation or laptop or desktop is not restoring it normally better to format and reinstall the operating system.

6 0
4 years ago
When a subdomain has been delegated to a zone on another server, the DNS server hosting the parent zone maintains only an NS rec
Vedmedyk [2.9K]

Answer:

True of False?

True

Explanation:

Different sub domains can be directed to different IPs servers but a client server cannot be forced to keep looking at name servers for additional records.

To delegate a subdomain to a zone on another server, one would need to add NS-records for the sub-domain name. This would point to the host names of the DNS servers hosting the sub-domain - in the parent zone.

In the "DNS records" window right-click the parent zone in the left list and select "New NS-record":

8 0
4 years ago
Other questions:
  • Is a growing network of physical objects that have sensors connected to the internet?
    15·1 answer
  • HELP PLEASE
    7·2 answers
  • Write the definition of a function divide that takes four arguments and returns no value . The first two arguments are of type i
    8·1 answer
  • Write the definition of a function named rotate4ints that is passed four int variables. The function returns nothing but rotates
    9·1 answer
  • How are natural systems and engineered systems similar to one another?
    8·1 answer
  • How do you freeze the total cell so that it doesn't change when copied?
    6·1 answer
  • What are the values of a[k] and a[k+1] after code corresponding to the following pseudocode runs?
    9·2 answers
  • Write a program that creates a Date object, sets its elapsed time to 10000, 100000, 1000000, 10000000, 100000000, 1000000000, 10
    9·1 answer
  • Please help me, i need help
    15·2 answers
  • Sub to splashy
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!