1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
2 years ago
10

Help me find the right answer please.

Computers and Technology
1 answer:
timama [110]2 years ago
5 0

Answer:

I'm not sure

Explanation:

I'm good at math but I do not see any numbers to work with. SORRY

You might be interested in
Which of the following types of network can only be accessed by members within a private organization?
Nadya [2.5K]
An Internet (C). because (A) is written wrong and there is nothing called extranet
3 0
3 years ago
Which presenter would most likely benefit from a custom slide show?
PIT_PIT [208]
Which presenter would most likely benefit from a custom slide show?

a teacher who teaches four sessions of the same course
3 0
3 years ago
Read 2 more answers
For this assignment your are to implement the Pet Class described in Programming Exercise 1, starting on page 494 in our textboo
choli [55]

Answer:

ohhhvhhffifyuddfuiicfdguc

5 0
3 years ago
Which Access database object asks a question about the data stored in a database and displays specific fields and records that a
AVprozaik [17]

Answer: Query

Explanation:

It is through the process of queries a user is able to ask questions about the data stored in the database and view specific fields as required. These queries can be of many type and each time using a query would give us the desired fields.

7 0
2 years ago
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
Other questions:
  • DSL technology is less efficient for service providers in the United States because many of their customers live in less-densely
    11·1 answer
  • You should use the longest possible shutter speed for all firework photographs.
    8·2 answers
  • Henrietta, the owner of a very successful hotel chain in the Southeast, is exploring the possibility of expanding the chain into
    15·1 answer
  • With arbitrary code execution, the ________________ launches ("spawns") a command shell from which instructions can then be issu
    11·1 answer
  • If you have a document that is relevant to more than one folder in your computer what should you do?
    8·1 answer
  • Write the definitions for three functions named max. Each receives two parameters, of the same type, and returns the larger of t
    14·1 answer
  • Write a formula that would return a TRUE result if the sum of the first five numbers in a column of data are negative
    7·1 answer
  • Please answer quickly :S
    7·2 answers
  • Make variables to represent the length and width of a rectangle, called length and width, respectively. You should set length to
    7·1 answer
  • 2.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!