1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valkas [14]
3 years ago
11

Bgtdeberbaf raaaaaaaaaaaaaaaaaaaaa graaaaaaaaaaaaaaaaaaaaaaaaaaa

Computers and Technology
1 answer:
barxatty [35]3 years ago
5 0

Answer:

Ok

Explanation:

I hope this helps?

You might be interested in
What is a back door?
V125BC [204]

Answer:

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment. Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems.

Explanation:

3 0
3 years ago
Read 2 more answers
Which of the following tasks is least effective at preventing a computer virus?
Ksivusya [100]

Answer:

all of the above mentioned

5 0
3 years ago
Read 2 more answers
Select the correct statement(s) regarding Frame Relay (FR). a. FR is a connection-oriented standard that operates at the OSI lay
DedPeter [7]

Answer:

d. all of the statements are correct

Explanation:

Frame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI reference model. i.e Layers 1 and 2 They are designed to cope with bursty traffic. Frame relay is also a form of data networking based on packet switching in which the packets are variable in length and experience packet delays.

Based on the above definition the correct statement is option d as all of the statements define in the other option correctly defines the function of frame relay.

7 0
3 years ago
Which customers are typical for the Argriculture,Food, and Natural Resources career cluster?
Ahat [919]

Ecosystem developers

8 0
4 years ago
Which feature is a dynamic grouping of applications used in Security policy rules?
larisa86 [58]

The answer is application group.


4 0
3 years ago
Other questions:
  • What decimal number does the bit pattern 0×0c000000 represent if it is a two's complement integer?
    5·1 answer
  • Explain briefly why we say that the "Web" exists only in our minds.
    14·1 answer
  • Consider Ron’s budget. How much money does Ron have left over each month?
    9·2 answers
  • Java code?????
    12·1 answer
  • Which soft skills would these mobile app developers need to use in the situations described?
    8·2 answers
  • 11) A single inheritance model means: * A) A class can only have one parent class (superclass) B) A class can only have one chil
    7·1 answer
  • Any correct answers will be helpful.
    13·1 answer
  • true false the if statement causes one or more statements to execute only when a boolean expression is true
    10·1 answer
  • Describe the role of a distributed file system in a job execution environment such as MapReduce in a large-scale cloud system. g
    11·1 answer
  • Which of the following is the safest authentication method?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!