1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
telo118 [61]
3 years ago
12

What do you need to know when buying screws​

Computers and Technology
2 answers:
ozzi3 years ago
6 0
The length and the width
zheka24 [161]3 years ago
6 0

Answer:

what size the socket is

Explanation:

plz thank me and mark brainliest thx

You might be interested in
Best company who provides the best ISP (internet service provider)?
valina [46]

Answer:

Explanation:

all internet service providers are garbage. especially in america.

so i will focus on only the positives about one. even though  i know a bunch of bad things about this one.

AT&T is super innovative in that they are bringing fiber optic to many homes in America. Fiber optic is a new type of wiring that brings the fastest Internet never seen before, at speeds of one gigabit per second or even more. Furthermore, their technicians tend to resolve any issues with routers at home.

5 0
2 years ago
A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrato
elena-s [515]

Answer: Session Hijacking

Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.

Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit  permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.

8 0
3 years ago
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes
rjkz [21]

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. The technician can<u> Issue the reload command without saving the running configuration.</u>

Explanation:

  • The technician does not want to make any mistakes trying to remove all the changes that were done to the running configuration file.
  • The solution is to reboot the router without saving the running configuration. The copy startup-config running-configcommand does not overwrite the running configuration file with the configuration file stored in NVRAM, but rather it just has an additive effect.
  • Configuration change control is a set of processes and approval stages required to change a configuration item's attributes and to re-baseline them.
  • Configuration status accounting is the ability to record and report on the configuration baselines associated with each configuration item at any moment of time.
  • The Manage System Configuration screen allows you to download, save, switch, revert and delete system configuration files.
  • Configuration Control is the activity of managing the product and related documents, throughout the lifecycle of the product.

6 0
3 years ago
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
2 years ago
Using the program below, explain what the output will be at LINE A. 1 #include 2#include 3#include 4 5 int value - 128; 6 7 int
slega [8]

Answer:

This is the complete correct program:

#include <stdio.h>

#include<sys/types.h>

#include<unistd.h>

int value = 128;

int main()

{

  pid_t pid;

  pid=fork();

  if (pid==0) /* child process */

  {

  value +=8;

  return 0; }

  else if (pid > 0) {/* parent process */

 wait (NULL);

 printf ("PARENT: value =%d\n" ,value); /* LINEA */

 return 0;

}

}

The output of the LINE A is:

PARENT: value = 128

Explanation:

The fork() function used in the program creates a new process and this process is the child process. The child process is same as the original process having its own address space or memory.

In the child process the value of pid is 0. So the if condition checks if pid==0. Then the child process adds 8 to the value of its variable according to the following statement  

value +=8;

Now the original process has value = 128. In else if part the parents process has the value of pid greater than zero and this portion of the program is of the parent process :

else if (pid > 0)

{ wait (NULL);

printf ("PARENT: value =%d\n" ,value);

return 0; }

So the value 128 is printed at the end in the output.

wait(NULL) is used to wait for the child process to terminate so the parent process waits untill child process completes.

So the conclusion is that even if the value of the variable pid is changed in the child process but it will not affect the value in the variable of the parent process.

5 0
3 years ago
Other questions:
  • Which layout manager constructor call would be best-suited to create a telephone handset GUI which has three rows of three keys
    12·1 answer
  • What is the function of the Status bar in Outlook 2010?
    9·1 answer
  • Which of the following is the best subject line for an e-mail sent to co-workers about rescheduling a team meeting? A. Reschedul
    12·2 answers
  • Does anyone know what happened to Cole Morgen, the actor?
    11·1 answer
  • Create a program that will read in a Salesperson name, employment status (1=Full-time AND 2=Part-time) and the sales amount.
    5·1 answer
  • Is downloading like installing?
    13·1 answer
  • What is the answer to in Microsoft Word you can access the blank from the command command from the mini toolbar what is the corr
    10·2 answers
  • All websites with medical information should be considered credible.
    15·2 answers
  • PLEASE FASTTTTT
    8·2 answers
  • A computer is made up of hardware and software ​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!