1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rom4ik [11]
3 years ago
10

Select the different network functions from the list below.

Computers and Technology
1 answer:
VashaNatasha [74]3 years ago
8 0

Answer:

IP address

blocking spam

power

SAN

You might be interested in
What is the difference between chrome and chromium browser?
olga_2 [115]
Have minor differences in features, logos, & licensing
8 0
4 years ago
What is the purpose of an IP address? A. identifying source and destination of data B. creating images on websites C. drawing ta
natka813 [3]

Answer:

The Answer is A. I could be wrong though.

3 0
3 years ago
Read 2 more answers
Wat is a computer risk<br>​
klemol [59]

Answer:

Virus, cyber theft

Explanation:

A computer risk is something that can potentially harm your data on your computer or harm you through a computer by using theft tactics from real people to autonomous viruses making it to your computer and slowing your computer. With cybrrtheft thieves can get personal info through accounts to pictures and payment information.

4 0
4 years ago
Read 2 more answers
You can move to the previous or next sheet by pressing the ____ keys.
Paladinen [302]
<span>ctrl+pg up (or ctrl) + pg down</span>
8 0
3 years ago
Who is the first computer programmer​
enot [183]

Answer:

Ada Lovelace was the first computer programmer

8 0
3 years ago
Read 2 more answers
Other questions:
  • Where in the windows registry would you store a key that starts an executable when the operating system starts?
    13·1 answer
  • If you are creating a new document that you know will be turned into a Web page, it is a good idea to start in _____.
    8·1 answer
  • What should you wear during lab investigations to protect your eyes?
    5·1 answer
  • 2. Using the Enhanced for Statement, write an application that uses an enhanced for statement to sum the double values passed by
    6·1 answer
  • A security manager has discovered that sensitive information stored on a server has been compromised. The organization is requir
    7·1 answer
  • Can anyone give me $2 (Reddem code/Promo Code)​
    15·2 answers
  • Many electronic devices use a(n) ?, which contains all the circuit parts in a miniature form.
    14·2 answers
  • Revisa un manual o instructivo de las maquinas o aparatos tecnologicos que tengas en tu casa. Luego, trata de encontrar algunas
    9·1 answer
  • Question 1 of 10
    8·1 answer
  • The packet storm web site includes a large collection of packaged shellcode, including code that can:_____.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!