1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serga [27]
3 years ago
8

A word I know, six letters it contains, remove one letter and 12 remains, what is it?

Computers and Technology
1 answer:
gulaghasi [49]3 years ago
3 0

Answer:

dozens

Explanation:

You might be interested in
You currently are IT support for Richman Investments, a brokerage firm that employs 20 brokers. Each broker has their own client
lions [1.4K]

Answer:

Use the System Restore tool to restore the affected computers back to a point before the problematic updates. To forestall issues with problematic updates, one needs to install and configure the Windows Server Update Services (WSUS) Server role.

Explanation:

Windows Update creates a restore point prior to applying any updates and this makes it easier to rollback any problematic updates using the aptly named System Restore utility.  System Restore can be launched either from within Windows or during startup depending on whether the computer can be booted  or not.

One solution to preventing this kind of problem is the implementation of a Windows Server role, the Windows Server Update Services (WSUS), which helps administrators to safely manage Windows Update for clients within its network. WSUS allows administrators to test updates for issues and approve them before they are available for deployment to clients.

4 0
3 years ago
Computer programming
Svet_ta [14]
Sjanqknjwolq esjkalqlkd
5 0
3 years ago
When using the Common Internet File System (CIFS), which security model will require network users to have a user name and passw
hjlf

Answer:

User-level Security

Explanation:

User-level security allows the user to access resources on a network using a username and password. User-level security offers higher and greater security than share-level security, which does not require a password to access files.

User-level security allows the database user access and permission to resources.

4 0
3 years ago
You are a desktop administrator for Nutex Corporation. A user reports that he is unable to access network resources. You notice
Tju [1.3M]

Answer:

The right answer is wire crimper tool.

Explanation:

According to the scenario, the most appropriate answer is the wire crimping tool because the wire crimping tool is a tool that can strip the wire then cut it in proper shape and then crimp the wire in the RJ45 connector very effectively.

RJ45 connector is a connector which is used in ethernet cables to connect to computers i.e. cat 5, cat 5e, cat 6, etc. these cable has 4 pairs of different color codes.

A wire crimper effectively connects the end of the cable to an RJ45 connector.

4 0
3 years ago
In order to paint a wall that has a number of windows, we want to know its area. Each window has a size of 2 ft by 3 ft. Write a
Eva8 [605]

Using the knowledge in computational language in JAVA it is possible to write a code that write a program that reads the width and height of the wall and the number of windows, using the following prompts

<h3>Writting the code:</h3>

<em>import java.util.Scanner;</em>

<em>public class WallArea {</em>

<em>    public static void main(String[] args) {</em>

<em>        Scanner sc = new Scanner(System.in);</em>

<em>        final int areaOfWindows = 6;</em>

<em>        System.out.print("Wall width: ");</em>

<em>        double width = sc.nextDouble();</em>

<em>        System.out.print("Wall height: ");</em>

<em>        double height = sc.nextDouble();</em>

<em>        System.out.print("Number of windows: ");</em>

<em>        double numberOfWindows = sc.nextDouble();</em>

<em>        double area = (width * height) - (numberOfWindows * areaOfWindows);</em>

<em>        System.out.println("Area: " + area);</em>

<em>    }</em>

<em>}</em>

See more about JAVA at brainly.com/question/12975450

#SPJ1

4 0
2 years ago
Other questions:
  • How to write a program that prompts the user to input two POSITIVE numbers — a dividend (numerator) and a divisor (denominator).
    13·1 answer
  • A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for
    10·1 answer
  • A​ ___________ identifies the content and purpose of the​ visual, along with whatever label and number​ you're using to refer to
    15·1 answer
  • Which of the following can a cell contain?
    9·2 answers
  • A thermostat with the processor program to control temperature is an example of what kind of computer
    6·1 answer
  • You are in the windows power shell window and decide to encrypt folder which of the following command do you use
    7·1 answer
  • What are the three control statements in Qbasic?​
    10·1 answer
  • What safety do you need to have ready to start a device repair?
    6·1 answer
  • What do you mean by Graphics editing​
    14·1 answer
  • Put simply, what tasks do algorithms help computers perform?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!