1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lapo4ka [179]
3 years ago
7

A wall is built of bricks. What force is being applied to each brick from the bricks above? ​

Computers and Technology
1 answer:
ValentinkaMS [17]3 years ago
5 0

Answer:

Gravitational Pull is the force that is being applied to each brick.

You might be interested in
Consider a tcp connection between host b and server
katrin2010 [14]
TCP stands for Transmission Control Protocol for Communication of the Internet.  It is used to  interconnect network devices on the Internet and it is a connection oriented protocol which means that the connection between the devices (in our case host b and sever C) is established and maintained until they finish to exchange messages. Source port number specifies the <span>application or services on host b and destination port number on host c. 
a. </span><span>The source and destination port numbers for the segments traveling from host c to host b are : source: 443 , destination: 2345.
b. From the destination port number (443) we can deduce that the server c that it is a web server. Port 443 is the standard port number for website which use SSL</span><span>(</span>Secure Sockets Layer<span>) .SSL is the standard security technology for establishing an encrypted link between a web server and a browser. </span>
7 0
3 years ago
LDAP is an industry standard employed by Microsoft, which enables IT departments to use a(n) __________ structure when creating
olchik [2.2K]

Complete Question:

LDAP is an industry standard employed by Microsoft, which enables IT departments to use a(n) __________ structure when creating user accounts and user groups.

(a)directory tree

(b)Organizational Unit (OU)

(c)forest

(d)file system

Answer:

(a) directory tree structure

Explanation:

Lightweight Directory Access Protocol (LDAP) is a special type of Directory Access Protocol (DAP) and it is a software protocol that allows the storage and retrieval of data objects (such as user accounts and user groups) that are arranged in an hierarchical directory structure. This hierarchical directory structure is called directory tree or directory information tree.

LDAP stores users and resources information of an organization. These information include usernames, passwords, email, human resource data e.t.c

5 0
3 years ago
In a clustered column chart, the names of each column are part of the ____ series. select one:
Ratling [72]
Data.......;...............;.........;......;.
4 0
3 years ago
Read 2 more answers
The area that holds all the instructions the computer needs to start up when it is powered on is ________.
stepan [7]

The area that holds all the instructions the computer needs to start up when it is powered on is b) ROM

Further Explanation:

RAM and ROM are the types of memory. RAM is the active memory. The data can be read and written from RAM. While ROM is read only which meas that data or instructions on ROM cannot be changed.

The files or instructions that are needed to start up a computer are usually unchangeable as they always have to be the same. These type of instructions are stored in ROM. When he computer is turned on, the instructions needed to start the computer are loaded into the main memory from the ROM.

Hence, ROM is the correct answer.

Learn more at:

  • brainly.com/question/10196212
  • brainly.com/question/10250188

#LearnwithBrainly

7 0
4 years ago
Después de un incidente de seguridad del cliente, el equipo realiza un análisis en profundidad de cada paso dado por los atacant
klio [65]

Explanation:

Respuesta al incidente

5 0
3 years ago
Other questions:
  • When the word “computer” was coined, what did it mean?
    12·1 answer
  • 7. Glaciers have two types of deposition. Define them below:
    6·1 answer
  • ________ errors may indicate that an attacker is trying to send invalid data to the server. 404 303 500 512
    11·1 answer
  • Which protocol do many browsers assume when you enter a URL in the address field?
    9·1 answer
  • You want to centrally back up the files users store in the Documents folder in their user profiles, but you don’t want users to
    7·1 answer
  • Which of the following are provided by most
    5·1 answer
  • Which of the following examples has four beats in each measure?
    12·2 answers
  • If an engineer wants to verify changes that she has been making on a router, which commands will allow her to check the routers
    15·1 answer
  • Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to pi
    8·1 answer
  • It is most commonly used for self-running presentations.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!