1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dem82 [27]
3 years ago
6

Which option should she use to add the terms

Computers and Technology
1 answer:
grin007 [14]3 years ago
8 0
No attached file for this problem.
You might be interested in
Casey Griggs is a very capable computer engineer. Recently, he noticed a problem that computer engineers have, and thought of a
diamong [38]

Answer:

serendipitous

Explanation:

this happened by chance in a positive manner.  

8 0
4 years ago
My computer keeps shutting down I've tried to completely wipe the memory but it didn't work do you have any ideas how to fix it
seropon [69]

Answer:

You could have a bug, virus, or you might have been hacked the most I can tell you is try to contact a technician to check it and try to help you. It could also be a problem with your internet, maybe you hit your computer against something and it broke something inside, or it could be a technical glitch. I hop this helps! Good Luck fixing your computer!

8 0
3 years ago
A company uses DHCP servers to dynamically assign IPv4 addresses to workstations. The address lease duration is set as 5 days. A
nikitadnepr [17]

Answer:

FF-FF-FF-FF-FF-FF and 255.255.255.255

Explanation:

FF-FF-FF-FF-FF-FF can be defined as the layer 2 address broadcast which is often used on ethernet frames as well as help to broadcast all equipment due to the fact broadcast is made possible through Ethernet networks in which the Frames are addressed to reach every computer system on a given LAN segment as far as they are addressed to MAC address FF:FF:FF:FF:FF:FF.

255.255. 255.255 can be seen as the layer 3 address which help to address the exact same hosts because it enables the broadcast address of the zero network which is the local network due to the fact that the IP broadcasts are often used by BOOTP and DHCP clients to find and send requests to their respective servers in which a message sent to a broadcast address may be received by all network-attached hosts.

Therefore the Layer 2 and Layer 3 destination addresses which the message contain are FF-FF-FF-FF-FF-FF and 255.255.255.255

7 0
4 years ago
The action in which a router divides and forwards incoming or outbound message traffic to multiple links is known as
kipiarov [429]
Load balancing is my best guess.
5 0
3 years ago
Write down the pseudo code for a brute-force algorithm to compare elements in array A with elements in array B.
Thepotemich [5.8K]

Answer:

def brute_force(array1, array2):

   for item in array1:

       for element in array 2:

           if element == item:

               print(f"{element} and {item} are a match")

Explanation:

A brute-force algorithm is a direct-to-solution algorithm that searches and compares variables. It is like trying to unlock a safe but not knowing its four-digit combination, brute-force starts from 0000 through 9999 to get a match.

The python program implements the algorithm using two nested for loops. The first loop iterates over array1 while the second, over array2. For every item in the first array, the program loops through the length of the second array. For every match, the items are printed on the screen.

5 0
3 years ago
Other questions:
  • Explain in your own words how you can use MSCONFIG and Task Manager to troubleshoot problems on the computer.
    15·1 answer
  • Which types of files can be used to define Kubernetes manifest files? yaml, json, yaml and text files
    5·1 answer
  • A key tactic that is used in many attacks, but very frequently in CEO Fraud, is creating a sense of what?
    15·2 answers
  • An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply thos
    5·2 answers
  • How wow low sow mow tow row fow
    13·1 answer
  • How to change my age on this app
    10·2 answers
  • Please help ASAP !!!
    15·1 answer
  • Why is dark supereffective against ghost? (AGAIN)
    8·1 answer
  • Niall is revising a history assignment using a word processor on a Windows computer. He wants to copy a section from an earlier
    8·1 answer
  • Think about how you view your emails—either the email service you use yourself or an email service you would choose to use. Desc
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!