1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
3 years ago
9

11.

Computers and Technology
2 answers:
AlladinOne [14]3 years ago
8 0
<span><span>their population crashed.
</span><span>
 </span></span><span>dead zone

 I believe </span><span>energy efficient</span>
dsp733 years ago
4 0
11. <span><span>their population crashed.
</span><span>
12. </span></span><span>dead zone

13. I believe </span><span>energy efficient</span>
You might be interested in
One vulnerability that makes computers susceptible to walmare is:
sammy [17]
C hope it’s right :))) !
6 0
3 years ago
Read 2 more answers
You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You def
vovikov84 [41]

Answer:

Trunking.

Explanation:

In Computer Networking, to allow a device on the first switch in VLAN 1 to communicate efficiently with a device on the second switch also in VLAN 1, you should configure trunking protocol on the switch.

Trunking is a communication technique used to transmit packets simultaneously to users on a network by using multiple lines or frequencies.

8 0
3 years ago
Which sentence correctly states the function of a control unit?
suter [353]

It's A. a controol unit performs arithmetical and logical computations


3 0
3 years ago
What are some ways to use and rework copyrighted materials ethically and legally?
Yuki888 [10]

you can use copyrighted material under fair use or for inspiration

hope this helps

scav

4 0
2 years ago
Read 2 more answers
A mentor can share personal successes and failures to show you what to do and what not to do.
mamaluj [8]
True is the answer to your question
7 0
3 years ago
Other questions:
  • At the dsl local carrier's office, the __________ demultiplexes the data streams and converts them into digital data.
    10·1 answer
  • Array A is not a heap. Clearly explain why does above tree not a heap? b) Using build heap procedure discussed in the class, con
    15·1 answer
  • What are some ways to accomplish full-duplex (FDX) digital communications on guided medium at the physical layer (OSI Layer 1)?
    7·1 answer
  • 2. A body is thrown vertically<br>100 m/s Theme taken to retum​
    13·1 answer
  • Store programming components in the shared folder. you want to secure the data in the folder as follows: members of the research
    11·1 answer
  • Which is a type of intellectual property law? Select 4 options.
    8·2 answers
  • Review the following definition of sustainable construction projects:
    10·1 answer
  • How can getchar function be used to read multicharacter strings?​
    14·1 answer
  • How do I delete my account on Brainly? It says I must enter my password to do so, but I never set up a password. When I try the
    8·1 answer
  • Write a program that prints the U.S. presidential election years from 1792 to present day, knowing that such elections occur eve
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!