1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zepler [3.9K]
4 years ago
13

How long can a lightning last

Computers and Technology
1 answer:
Maru [420]4 years ago
8 0
A lightning can last 30 microseconds.
You might be interested in
You have received an update package for a critical application you are running on a virtual machine. You have been told to insta
erastovalidia [21]

The first thing to do install the package without having downtime is; Virtualization.

<h3>What is virtualization? </h3>

Virtualization is defined as the ability to install and run multiple operating systems simultaneously on a single physical computer virtually.

Now, virtualization has many advantages for server administrators. This is because as an administrator, your job is made easier due to the several tasks you can perform on a virtual machine instead of on a physical machine.

Since there should be no down time, then it is advisable to first carry out virtualization.

Read more about virtualization at; brainly.com/question/26462832

6 0
2 years ago
What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
GrogVix [38]

Answer:

PAP authentication method

Explanation:

PAP known as Pass word authentication protocol Basically, PAP works like a standard login procedure; the remote system authenticates itself to the using a static user name and password combination, so not recommended for applications.

6 0
3 years ago
What does it mean when someone silences notifications?.
grandymaker [24]

Answer:

Silencing notifications does not alert someone when the notification comes in. It is silent. These settings were invented to help avoid distractions. The notifications still come in just quietly without an alert and can be checked at any time. Lots of people silence notifcations at night, while sleeping, while studying, etc.

Explanation:

4 0
2 years ago
The next generation ip version and successor to ipv4 is called what? ipv5 ipv6 iana ssl
Olenka [21]
I study IT,it was Ipv 6 in our textbook
4 0
4 years ago
A(n) _____ allows a user to choose specific files to back up, regardless of whether or not the files have been changed.
Anna35 [415]
<span>A selective backup allows a user to choose specific files to back up, regardless of whether or not the files have been changed.</span>
7 0
3 years ago
Other questions:
  • Does Logarithms and Algorithms same things?
    6·1 answer
  • A defined set of standards that computers must follow in order to communicate properly is known as a
    13·2 answers
  • the default name for the small icon that represents a web site or page, and is displayed in the browsers, typically at the begin
    9·1 answer
  • David owns a retail business that just implemented a web app to supplement sales. He needs to choose an attribution partner to i
    15·1 answer
  • A network technician is attempting to add an older workstation to a Cisco switched LAN. The technician has manually configured t
    11·1 answer
  • Short notes on Supply chain Management System (SCMS)
    12·1 answer
  • Describe FIVE distinct features of multi-threaded programming. Your answer should be language independent. g
    9·1 answer
  • What are styles? built-in conditional formatting rules formatting applied with the Format Painter defined combinations of format
    15·2 answers
  • NEED HELP ASAP!!!!!!!!!!!
    7·1 answer
  • _______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!