1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna007 [38]
3 years ago
6

What is the shortest, abbreviated version of the copy running-config startup-config command?

Computers and Technology
1 answer:
Juliette [100K]3 years ago
5 0

The answer is cop r s

The copy running-config startup-config command is a CISCO command used to back up the running config file to NVRAM. This ensures that once you have completed the basic configuration of a router or a switch, the changes made are not lost if the system loses power or is rebooted.

 

You might be interested in
This is tech question related to mobile and PC.
love history [14]

I am guessing the bluetooth process is same as usb proccess. So when i transfered a video via usb and took out the usb (for apple phone), there <u>was</u> a file but when i clicked it it said that the phone isn't plugged in

4 0
3 years ago
Packet switching was invented by: <br> Apple <br> DARPA <br> Google <br> Microsoft
riadik2000 [5.3K]

Answer:  darpa

Explanation:

8 0
3 years ago
Select the correct answer.
pochemuha

Answer:

Answer is will be D

Explanation:A is tablet is not able to make call

B: Handheld and consoles cant be because The console is usually used to write pieces of information from the program for the developer

c: Handhelds and phone cant be so

D: This is tablet is combined handhelds & computer ,you can call like tablet pc

I hope i help you

8 0
2 years ago
Read 2 more answers
Define an object named outfile that can be used to write data from program variables to a file.
ad-work [718]
<span>An object that named outfile that can be used to write data from program variables to a file is an ofstream. An ofstream is used to maintain and keep the filebuf things and they are used as internal stream buffer. It is also connected with its identified files and its primary files.</span>
7 0
3 years ago
When Web site visitors are involved in downloading malicious code without their knowledge, they may be unknowingly involved in w
lesantik [10]

Answer:

Drive-by download

Explanation:

The unintentional download of malicious code onto a computer or mobile device that exposes users to different types of threats.

4 0
2 years ago
Other questions:
  • When a crystal grows in unrestricted space, how does growth occur?
    14·2 answers
  • Tornado Alley is located in the middle of the United States, extending from Texas up through the Dakotas. The above statement is
    14·1 answer
  • Spreadsheet software creates a ____, composed of a grid of columns and rows
    6·1 answer
  • Gina works in an SDLC team. When Gina makes changes to a file, no one else is allowed to acess it. Which type of version control
    10·1 answer
  • Which wildcard characters will return a single character when using the Find dialog box?
    6·2 answers
  • Which of the following are characteristics of algorithms? Choose all that apply. They take a step-by-step approach to performing
    12·1 answer
  • During the design phase of the systems development life cycle (SDLC), the _____ design is created for a specific platform, such
    8·1 answer
  • Which of the following statements is true?A)Implicit data type conversion is performed when you mix values of different data typ
    5·1 answer
  • How do i use a computer (i'm 99999 years old)
    8·2 answers
  • Computer Hardware can consist of a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!