1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelechka [254]
2 years ago
13

The border that defines the outer boundary of a shape or other object

Computers and Technology
1 answer:
Over [174]2 years ago
8 0
The answer is outline
You might be interested in
Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
Luden [163]

Answer:

The packet is dropped

Explanation:

To see why we need to understand the ACL or Access-control list that is a list of permissions that specify which users can access or modify certain things in a system. Because the source IP  doesn't have any parameter and is just a plain IP and packet the Cisco firewall will drop the packet based on the ACL rules, in other words, the Cisco firewall doesn't have any parameter that allows it to verify the permission-level of the sender, therefore, the packet will drop.  

7 0
3 years ago
Under what key category do page up and page down keys fall?
Taya2010 [7]
Page up and page down keys fall under the DIRECTION
keys category
6 0
3 years ago
2. What's the keyboard command that will allow you to "copy" text?
nataly862011 [7]

The answer is Ctrl c

8 0
3 years ago
Read 2 more answers
Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri
Schach [20]

Answer:

Option b, Option c, and Option d  are the correct options.

Explanation:

While Sherri is replacing the laptops processor because her's laptop working slow as compared to the past performance then, she decided to ensure to use the right processors for her laptop's motherboard. Then, she verifies that not under the warranty, and she also determines that the teardown procedure is available or not.

4 0
3 years ago
Review the portion of the application above. Record any changes or corrections that need to be made and why.
crimeas [40]

Answer:

Necessary Corrections: First Name and Last Name are recorded in incorrect boxes. Scribbles on errors instead of making corrections Does not include information in the SSN or Desired Salary blank Does not list which position she is applying for Has box checked that she has worked for the company, but does not say when For education just wrote “Yes” instead of listing the high school and address Justification: All of this make the applicant appear less professional and hurt her chances of getting hired. She is not following the directions properly, and she is not asking questions so that she can accurately fill out the application.

(I got a 100% so I know its correct)

4 0
2 years ago
Other questions:
  • Diane wants to maintain a record of grades scored in the fifth, sixth, and seventh grades. She enters her grades and the total p
    13·1 answer
  • A _____ is a device that not only provides surge protection, but also furnishes desktop computers and network devices with batte
    7·1 answer
  • Who was the 1st person to use the term television
    11·1 answer
  • python A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun
    15·2 answers
  • cpp g Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print fo
    15·1 answer
  • Look at the network topology. What will happen with the other computers if the computer breaks at the RED X?
    8·1 answer
  • 1-5 Safety measures in the use of kitchen tools and equipment.​
    9·1 answer
  • Define the terms network, LAN, WAN, and Internet.
    11·1 answer
  • You have been on the phone with a user in a remote office for 30 minutes troubleshooting their minor desktop problem. No matter
    6·1 answer
  • Josh is learning about hackers known for causing damage and altering functions of websites. Which type of hacker is he learning
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!