1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adelina 88 [10]
3 years ago
8

PLEASE HELP ASAP!!!

Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
7 0

Answer:

Explanation:

Attribution (CC BY)

Attribution ShareAlike (CC BY-SA)

Attribution-NoDerivs (CC BY-ND)

Attribution-NonCommercial (CC BY-NC)

Attribution-NonCommercial-ShareAlike (CC BY-NC-SA)

Attribution-NonCommercial-NoDerivs (CC BY-NC-ND)

You might be interested in
Which of the following are the dimensions of feasibility? Group of answer choices cost, schedule, technical, and organizational
Paha777 [63]

Answer:

"cost, schedule, technical, and organizational feasibility schedule" is the correct option.

Explanation:

A technical feasibility is the study of the concerned about the specifying software and tools which satisfy the users' need. It is also the process of thinking for which business technologies are important to bring labours, transportation, and materials.

An organizational feasibility is the study of the information of the professional background and about the skills which are necessary for the contribution in the business.

7 0
3 years ago
you want to implement a protocol on your network that allows computers to find the ip address of a host from a logical name. whi
aniked [119]

The protocol that should be implemented is that one needs to enable hosts on the network to find the IP address.

<h3>What is IP address?</h3>

It should be noted that IP address simply means a unique address that defines a device on the internet.

In this case, the protocol that should be implemented is that one needs to enable hosts on the network to find the IP address.

Learn more about IP address on:

brainly.com/question/24930846

#SPJ12

7 0
2 years ago
What does a blinking yelow light mean on a phillips sonicare toothbrush
babunello [35]

Answer:

it means that you need to charge it or change the batteries depending on what kind you have

3 0
3 years ago
Which of the following declares an abstract method in an abstract C++ class? (Points : 2) public: void print();
Dahasolnce [82]

Answer:

public: virtual void print()=0;

Explanation:

An abstract class contains a pure virtual function. Pure virtual class cannot be instantiated but it can be subclassed and the subclass can provide an implementation of the function.

A virtual function declaration in the class is preceded by the virtual keyword. For example, virtual void print();

A pure virtual function declaration is followed by '=0;'

public: virtual void print()=0;

4 0
3 years ago
In workstation domain policies, _________________ provide the specific technology requirements for each device. IT staff uses re
Snezhnost [94]

Answer:

The correct word for the blank space is: baseline standards.

Explanation:

Minimum Baseline Standards (MBS) refers to the minimum security guidelines companies set to protect their sensitive data. To achieve such objective, all the devices of an entity -<em>e.g.: servers, routers, and firewalls</em>- must be configured in a form that prevents external or internal attacks. Setting an MBS helps an organization to provide technical support faster since regular users will be working with a system that was implemented by the <em>Information Technology</em> (IT) department of the same association.

6 0
3 years ago
Other questions:
  • AYUDAAA..... DARÉ TODOS LOS PUNTOS QUE PUEDA.
    15·1 answer
  • If you implement a Wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fal
    5·1 answer
  • Explain the history of computing of mechanical era
    14·2 answers
  • You are the network administrator for a school system. Your boss informs you that she is thinking of implementing a BYOD program
    15·2 answers
  • Circular error are caused by adding the cell name of a/an cell to aformula
    7·1 answer
  • Does the estimate of a tolerance level of 68.26% of all patient waiting times provide evidence that at least two-thirds of all p
    13·1 answer
  • Differentiate between perfect and imperfect market​
    14·1 answer
  • 3. Special keys labelled Fl to F12.
    8·1 answer
  • A) Calculate the checksum of following 2 bytes: 00110101 and 10101100, and fill in the blank:
    14·1 answer
  • How would a barcode reader be used in a healthcare industry?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!