1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Colt1911 [192]
3 years ago
6

Drag the tiles to the correct boxes to complete the pairs.

Computers and Technology
1 answer:
Gala2k [10]3 years ago
6 0

Answer:

So the first one i think is A. The second is 2, and that i do know

Explanation:

You might be interested in
The _____ feature automatically corrects typing, spelling, capitalization, or grammar errors as you type them.
sergejj [24]
Spell-check feature is the one that auto corrects any misspelled words
5 0
3 years ago
If you need to provide a storage server with fault tolerance through the use of multiple paths between the server and the actual
yan [13]

Answer:

The correct answer to the following question will be "Multipath I/O ".

Explanation:

Multipath I/O going to minimize the impact of a failure of either the host network interface by offering an alternative access route through storage media as well as a Windows OS.

  • It offers the possibility for someone like you to support high accessibility and significantly improve efficiency based on your SAN setup.
  • Offer valuable even fault resistance to a terminal server by using different objectives or paths.

So, you should install this Multipath I/O.

3 0
3 years ago
Which type of network attack uses a fake IP address to send data packets from an unauthorized user to a network?
liq [111]
D. DoS. DoS is a way to potentially lag or even crash different types of servers ranging from as small as a simple website to bigger websites and video games servers.
6 0
3 years ago
Read 2 more answers
Write a program that uses the function strcmp() to compare two strings input by the user. The program should state whether the f
Andru [333]

user_str1 = str ( input ("Please enter a phrase: "))

user_str2 = str ( input("Please enter a second phrase: "))

def strcmp (word):

user_in1 = int (len(user_str1))

user_in2 = int (len(user_str2))

if user_in1 > user_in2:

return "Your first phrase is longer"

elif user_in1 < user_in2:

return "Your second phrase is longer"

else:

return "Your phrases are of equal length"

3 0
3 years ago
In a binary search, _______________________________ . a. It is assumed that all of the elements are integers. b. It is assumed t
madam [21]

Answer:

d. It is assumed that the search pool is ordered.

Explanation:

A binary search/logarithimic search/half interval search/binary chop refers to search algorithm in computer science that sorts data in array in key:value arrangements. In order to locate a value in binary search, the key to the value in a sorted array is located. A binary search is characterized by an ascending, descending order arrangement of the array.

6 0
3 years ago
Other questions:
  • Imagine that you are an independent filmmaker making a feature-length narrative film in the United States, with a variety of bot
    11·2 answers
  • Code the function (insertNth list N insValue) which constructs a new list by inserting the specified insValue into the list afte
    6·1 answer
  • If a pilot is converting standard time to UTC time and is given the time 1730 UTC, what would EST be?
    8·2 answers
  • In this context, the word “session” refers to _____.
    5·2 answers
  • Baking Cookies. Sweet Dough Inc. bakes cookies—a popular dessert—based on the quantities ordered by their customers. Three raw m
    12·1 answer
  • All health information available on the internet is valid. <br> a. true <br> b. false
    6·1 answer
  • "Random Bars" is considered to be a Transition style<br> O True<br> O False
    11·1 answer
  • Choose the true statement below. (html)
    5·1 answer
  • ________ is the general name for a security flaw in a program. Group of answer choices A security fault A virus Malware A vulner
    13·1 answer
  • Three primary types of data that a forensic investigator must collect, in this order: 1.Volatile data 2.Temporary data 3.Persist
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!