1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irga5000 [103]
2 years ago
13

In 1-2 sentences, describe some keyboard shortcuts you have used during this lesson to save you time.

Computers and Technology
2 answers:
alisha [4.7K]2 years ago
6 0

Answer:

uhhhh

Explanation:

Aneli [31]2 years ago
5 0
Command C command V command A
You might be interested in
Identify measures to protect your computer against threats from human actions. You cannot access a file in a computer that belon
scZoUnD [109]

Answer:

Firewalls

Explanation:

A firewall is simply a network security system whose main duty is. to prevent unwanted access to. private network.

Firewalls is measures to protect your computer against threats from human actions.

It is also the one singular thing that prevents you from accessing the file on your friends system.

5 0
3 years ago
After installing the processor, if the system begins the boot process and suddenly turns off before completing the boot, the pro
NikAS [45]

Answer:

A. True

Explanation:

Be sure your processor is receiving sufficient cooling by verifying if there is a heatsink on it. If there is, make sure that it's inserted fully into cpu_fan port on the motherboard. If the boot process still turns off, you may have a defective processor or replace the motherboard.

8 0
3 years ago
Which type of communication protocol converts data into standard formats that can be used by applications?
larisa86 [58]
<span>Arrival protocols are the type of data protocols that convert data into standard formats that can be used by applications, such as email, Web browsers and Skype</span>
8 0
3 years ago
EASY POINTS
Dmitry [639]
Its answer D because I took the same test and it told me that my answer was right that I put down and it was D.

3 0
3 years ago
You are employed as a network administrator at Widget. The Widget network is TCP/IP based. You have been instructed to configure
wolverine [178]

DHCP operations fall into four phases: server discovery, IP lease offer, IP lease request, and IP lease acknowledgement. These stages are often abbreviated as DORA for discovery, offer, request, and acknowledgement.

Explanation:

  • DHCP provides reliable IP address configuration, while reducing network administration.
  • Discovery : The DHCP client broadcasts a DISCOVER message on the network subnet using the destination address or the specific subnet broadcast address.  A DHCP client may also request its last known IP address
  • Offer :When the server receives a DISCOVER message from a client, which is an IP address lease request, the DHCP server reserves an IP address for the client and makes a lease offer by sending a OFFER message to the client.
  • Request : In response to the DHCP offer, the client replies with a REQUEST message, broadcast to the server,[a] requesting the offered address.
  • Acknowledge : When the DHCP server receives the REQUEST message from the client, the configuration process enters its final phase. The acknowledgement phase involves sending a ACK packet to the client.
7 0
3 years ago
Other questions:
  • Data mining is ______? a process of finding meaningful patterns in data to improve decisions a strategy for locating security so
    7·1 answer
  • he Saffir-Simpson Hurricane Scale classifies hurricanes into five categories numbered 1 through 5. Write an application named Hu
    10·2 answers
  • A popular use of cd-rw and cd-r discs is to create audio cds. what is the process of copying audio and/or video data from a purc
    11·1 answer
  • When you hack a website, do you enter in the master code in the html section code data, or the offline/online system?
    14·1 answer
  • I just want to ask if some one know an online school program that offer a live session and the cost of it not to expensive. for
    10·1 answer
  • Try writing pseudo code that describes how your device uses input data to perform the action that you want.
    9·1 answer
  • What are the top and side margins for a letter typed in standard format?
    11·1 answer
  • As technology advances, does technology become more of less complex?
    14·1 answer
  • Which of the following might an interior designer in the retail industry specialize in?
    9·1 answer
  • Assume you have a button control named btndisplaylist. Which is the default name for an event procedure that will be executed wh
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!