1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tekilochka [14]
3 years ago
9

State two functions of windows environment​

Computers and Technology
1 answer:
Hitman42 [59]3 years ago
8 0

Answer:

idonoheheheheheuhiiikv

You might be interested in
What are examples of real-time applications
Savatey [412]

Typical examples of real-time systems include Air Traffic Control Systems, Networked Multimedia Systems, Command Control Systems etc.

3 0
4 years ago
Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofin
Ipatiy [6.2K]

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

4 0
3 years ago
Where are domain user passwords stored?
seropon [69]

Answer:a)Local Database

Explanation: Local database is the type of the application database storage that is responsible for storing of the data locally in accordance with the application. It uses the SDF files for the processing and these files don't require much effort such as installing of any particular server for the database.They are considered as not highly secure databases.Therefore,the correct option is option(a).

8 0
4 years ago
So what do I do if it doesn't take me to the sign up page? I
vesna_86 [32]

Answer:

Try to restart the computer or something.

Explanation:

8 0
3 years ago
Assuming we do not use recursion, why is a loop necessary to find an arbitrary node in a linked list
anastassius [24]

Answer:

We cannot access nodes in the linked list directly.

Explanation:

In linked list we cannot access nodes directly like arrays.In arrays we have index for the direct access to the element.So we have to iterate over the linked list and search for the node one by one.Since we are not using any recursion so we have to use loop to iterate over the linked list.

4 0
4 years ago
Other questions:
  • which application software allows you to compose written ideas on a computer? database, spreadsheet, word processor or graphics
    13·1 answer
  • Please answers the questions 1-15
    6·1 answer
  • Search engine bing offers
    15·1 answer
  • Enzymes_____________.
    7·1 answer
  • Assume that there is a class called BankAccountHolder that represents an individual member of a bank. There is also a BankAccoun
    5·2 answers
  • This is your code.
    9·1 answer
  • 1
    8·1 answer
  • bro i got banned for posting an amazing bulk pic, but this dude literally posted an inappropriate, dafuq is wrong with this bann
    8·2 answers
  • What does the following process describe?
    10·1 answer
  • how could environmental and energy problem Kenya faces as far computer installations are concerned be avoided​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!