1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
3 years ago
10

Clusters always occur in multiples of what? A.)10 B.)5 C.)2 D.)100

Computers and Technology
2 answers:
kotykmax [81]3 years ago
8 0
I would say ten would be the answer
djverab [1.8K]3 years ago
4 0
2 ..........................
You might be interested in
Which two tasks are associated with router hardening? (choose two.)?
nexus9112 [7]

Disabling unused ports and interfaces.

Securing administrative access.

Router hardening means that the router is secured against attacks as best as possible. Router hardening is one among the three areas of router security that must be maintained to secure an edge router at the network perimeter. Basically, router hardening secures from tough-to-crack passwords, to the shutting down of unnecessary interfaces, ports, and services. Look for any unused router interfaces and disable them by issuing the shutdown command. Disabling unused services typically include BOOTP, CDP, FTP, TFTP, PAD, and a few others. You can also disable administrative and management protocols currently not being  like HTTP or HTTPS, DNS, and SNMP.

8 0
3 years ago
HELP ASAP
Nutka1998 [239]

Storyboarding is helpful during the planning stage of web design.

Explanation:

Organizing your thoughts can be a struggle. In other words, keeping characters, footages, and concepts coherent and apprehensive is a hassle. Visual representation of these concepts can help you stay structured and storyboarding is the best way visual organizer.

Story boards serve as the suitable blend of visuals and text. As far as script writing, novels, and creating other comprehensive plots, storyboards are perfect for sorting information.

4 0
3 years ago
Read 2 more answers
Write smallest to largest: Byte, bit, MB, PB, GB, nibble
OlgaM077 [116]

Answer:

  1. bit
  2. nibble
  3. byte
  4. MB
  5. GB
  6. PB

Explanation:

this is it!!!

3 0
3 years ago
Read 2 more answers
Does a soda vending machine Give reciepts?<br><br>need for computer science hw
kupik [55]
No, they do not give receipts.<span />
6 0
3 years ago
Read 2 more answers
You want to implement a mechanism that automates ip configuration, including ip address, subnet mask, default gateway, and dns i
telo118 [61]
You're probably looking for DHCP (Dynamic Host Configuration Protocol).
5 0
3 years ago
Other questions:
  • Which sparkline type is best for displaying trends in data changes over time?
    11·1 answer
  • A culture that emphasizes verbal communication skills is ____________.
    9·2 answers
  • Convert 78 to binary
    6·2 answers
  • Who invented the speaker?
    14·2 answers
  • Which is a benefit of getting information from a government website?
    15·2 answers
  • Please help me ASAP! Here is the question.
    15·1 answer
  • What are the characteristics of the sorting and grouping options in Outlook? Check all that apply. Columns can be sorted by clic
    15·2 answers
  • What might a designer need to consider when choosing an appropriate energy source for products and power systems
    15·1 answer
  • List and describe each of the activities of technology
    11·1 answer
  • Give a brief explanation about the internet.plsssss
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!