1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
4 years ago
9

Q-3 A technician is setting up a computer lab. Computers on the same subnet need to communicate with each

Computers and Technology
1 answer:
Tasya [4]4 years ago
4 0

Answer:

the answer would be B proxy server

You might be interested in
This is not for school but how do I mark am answer brainliest?
JulsSmile [24]

He was brainliest BEFORE I answer it, so that needs an explanation

4 0
4 years ago
Course hero 21. say you have a /15 network address. you are asked to create subnets with at least 1,000 hosts/ subnet. what is t
Sladkaya [172]
15 length of network ID, 2^10=1024, so 10 bits is the length of host ID and subnet ID is 7 bits since 32-15-10= 7, so 2^7=128 
8 0
3 years ago
The LPN/LVN cares for an older client admitted to the hospital for treatment of a fractured femur. The LPN/LVN notes the client
vazorg [7]

Answer:D.Social interaction.

Explanation: Social interaction is the term used to explain the social exchanges taking place between two or more people. Through social interaction people design rules,regulations, institutions and systems within which they live their lives.

In late adulthood,social interaction is very vital to help the person to develop a good self esteem, the LPN/LVN(licensed vocational nurse/license practical nurse) plan should include social interaction to help the client.

3 0
3 years ago
Read 2 more answers
Your boss wants to utilize some sort of cloud storage for his files so that all of his
Valentin [98]

Well, if he's using Google Drive or OneDrive it shows up in the main menu so My best guess would be Local Profile

4 0
3 years ago
Read 2 more answers
________ allows only limited use of media that has been legally purchased.
Reptile [31]
Digital Rights Management (DRM) allows only limited use of media that has been legally purchased. The DRM includes access control technologies for <span>copyright protection for </span>digital media. DRM defines <span>what you as a software or hardware user can and can't do with the media and hardware you've purchased. </span> 
3 0
3 years ago
Other questions:
  • The following parts were ordered by someone building a personal computer:
    12·1 answer
  • You discover memory is corrupted, what would be an indication of a software vs. a hardware issue?
    5·1 answer
  • Which function is going to find the lowest value in a range of numbers? MIN MAXAVERAGE COUNT
    5·1 answer
  • A={a,b,c,d} B={p,q,r,s} find the value of A-B and B-A​
    13·1 answer
  • The mutating-table error is raised when a trigger attempts to execute a. an INSERT, UPDATE, or DELETE while another user is upda
    10·1 answer
  • What is your favorite coler and what do you like to do and
    13·1 answer
  • How did New York Governor Hugh Carey handle Sostre’s situation?
    9·2 answers
  • 80billion +2 TRILLION . PLEASE AWNSER
    7·1 answer
  • an attacker is attempting to crack a system's password by matching the password hash to a hash in a large table of hashes he or
    9·1 answer
  • What is 11x12x12x14x15x16
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!