1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
4 years ago
15

MATCHING

Computers and Technology
1 answer:
JulijaS [17]4 years ago
8 0

1 is B

2 is C

3 is A

Verified all the answers.

You might be interested in
There are 10 girls and 8 boys at a party. A cartoonist want to sketch a picture of each boy with each girl. How many sketches ar
kykrilka [37]
80 sketches will be required. It’s just multiplication. Let x=boys and y=girls. If x=8 and y=10, then one boy has to be with one girl. In total 1 boy will be with 10 girls, so that’s 10 sketches. You do the same for boy #2 and so on. It adds up to 80.
3 0
3 years ago
A _____ is a collection of (potentially) thousands of computers that can respond to requests over a network
Rom4ik [11]

Answer:

server or supercomputer

Explanation:

5 0
2 years ago
What is the main purpose of a DNS server?
Daniel [21]

Answer:

C

Explanation:

Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.

3 0
3 years ago
Allen needs a program that injects automatically semi-random data into a program or stack and detects bugs. What will he use?
Goryan [66]

Answer:

A) fuzzer

Explanation:

From the question, we are informed that Allen needs a program that injects automatically semi-random data into a program or stack and detects bugs. In this case,he will use a fuzzer. A fuzzer can be regarded as a program that gives in a semi-random data to a program/stack, and it will detect bug. fuzzing testing can be regarded as

software testing process which discover bugs in the software, this is done automatically by giving in input of randomized data to the computer program. Generation of data is done by a generator, while vulnerability identification depends on the tools use in the debugging process.

8 0
3 years ago
Ik this isnt an assignment question, but can ya'all friend me? Im lonely ;-; lol
Elan Coil [88]

Answer:hi I’m lonely too

Explanation

:)

4 0
3 years ago
Other questions:
  • For homework, we have to figure out what's in the picture. It's " too close to tell " but I can't figure out what it is. Any ide
    11·1 answer
  • What does ieee stand for
    14·2 answers
  • Most professional coding standards use _____ for class names. (Points : 2) underscores along with all upper case words
    15·1 answer
  • Which operating system is a version of Linux?​
    13·1 answer
  • Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
    14·2 answers
  • How many months have 28 days?
    8·1 answer
  • PowerPoint SAM Capstone Project 1 can PLEASE someone do it for me I have some directions like steps and you just have to do it i
    10·2 answers
  • What is the two’s compliment of -95,-122,-111,-57
    9·1 answer
  • Software piracy can be described as
    10·1 answer
  • What enforces the location in which an app can function by tracking the location of the mobile device?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!