1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
8

The presentation layer describes the layer where computers interact with _____

Computers and Technology
2 answers:
Dovator [93]3 years ago
5 0
I believe its other computers 
alexdok [17]3 years ago
5 0
The answer is other computers. 
You might be interested in
For any element in keysList with a value smaller than 40, print the corresponding value in itemsList, followed by a comma (no sp
givi [52]

Answer:

u look se33y yessir

Explanation:

......................................

7 0
3 years ago
CPT (Current Procedural Terminology) codes consist of 3-4 numbers representing a unique service. True False
xz_007 [3.2K]
This is in fact false to my knowledge
4 0
4 years ago
Return a formatted string with numbers The function below takes three numerical inputs: num1, num2, and num3. Implement it to re
alexira [117]

Answer:

In Python:

def ret_formatted(num1,num2,num3):

   result = str(num1)+"_"+str(num2)+" ! "+str(num3)

   return result

Explanation:

This defines the function

def ret_formatted(num1,num2,num3):

This generates the output string

   result = str(num1)+"_"+str(num2)+" ! "+str(num3)

This returns the result string

   return result

3 0
3 years ago
You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
shepuryov [24]

Answer: Flag

Explanation:

When using an application control solution, it should be noted that the application whitelist is typically centrally defined which is applied to the network devices. In such case, the applications that are contained in the whitelist will be the only one that are allowed.

Therefore, the applications that are not contained in the whitelist should be flagged. This is necessary in order to effectively monitor the user traffic for a period of time in order to discover user behaviors.

5 0
3 years ago
Match the parts of the website address with its correct explanation. http://www.usa.gov/Agencies/federal.shtm/​
meriva

sorry I was just testing something

6 0
3 years ago
Read 2 more answers
Other questions:
  • Why would a brokered CD pay more than a regular CD?
    13·1 answer
  • Write a function that accepts a list as an argument (assume the list contains integers) and returns the total of the values in t
    10·1 answer
  • What is an ISP?<br> in computer Networking
    11·2 answers
  • Physical activity such as sports or even a brisk walk can help reduce
    7·2 answers
  • _____ is a predefined format used for text the can include multiple font formatting features
    13·1 answer
  • PLEASE HELP FAST
    5·1 answer
  • Which statement assigns the value 98 to the variable myScore in Python?
    14·2 answers
  • In order to convert your project to a mobile platform, you need to do all of the following except:
    14·1 answer
  • You are adding more features to a linear regression model and hope they will improve your model. If you add an important feature
    7·1 answer
  • PLEASE HELP ASAP
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!