1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
3 years ago
14

To delete a comment, right click the comment and then select the ____ command.

Computers and Technology
2 answers:
aleksandrvk [35]3 years ago
8 0

delete command is your answer i tink

jekas [21]3 years ago
3 0

On the Review tab, in the Comments group, click the Delete command.

You might be interested in
Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets i
Alexeev081 [22]

Answer:

TRUE

Explanation:

Intrusion Detection System (IDS) monitors policy violations or malicious activities in a system or network. It could be a device or a software application.

IDS differs according to the size of the network. There are two main classifications: Host-based Intrusion Detection System (HIDS) and Network Intrusion Detection System (NIDS). HIDS observes important Operating System (OS) files. While the NIDS analyses network traffic, they are placed at a unique point or several unique points to monitor outgoing and incoming traffic within the network.

Hence it tries to identify unique sequences appearing across several packets in a traffic stream than in individual packets.

7 0
4 years ago
How do l write a program which countdown from 10 to 3​
earnstyle [38]

Answer:

use loop

for(int i =10;i>2; i--)

{

System.out.println(i+"\n")

}

4 0
3 years ago
What is the Matlab command to create a vector of the even whole numbers between 29 and 73?
Nana76 [90]

Answer:

x = 29:73;

x_even = x(2:2:end);

Explanation:

In order to create a vector in Matlab you can use colon notation:

x = j:k

where <em>j</em> is 29 and <em>k</em> is 73 in your case:

x = 29:73

Then you can extract the even numbers by extracting the numbers with even index (2,4,6,etc.) of your vector:

x_even = x(2:2:end);

In the line of code above, we define <em>x_even</em> as all the elements of x with even index from index 2 till the end index of your vector, and an increment of 2 in the index: 2,4,6,etc.

If you want the odd numbers, just use the odd indices of your vector:

x_odd = x(1:2:end);

where <em>x_odd</em> contains all the elements of <em>x</em> with odd index from index 1 till the end index, and an increment of 2: 1,3,5,etc.

6 0
3 years ago
An IP packet to be transmitted by Ethernet is 60 bytes long, including all its headers. If LLC is not in use, is padding needed
salantis [7]

Answer:

No padding

Explanation:

64 bytes is taken as the minimum Ethernet frame, this encompass checksum as well as addresses in the Ethernet frame header and length field. while the maximum Ethernet frame is 1518 bytes, any minimumEthernet frame that is short compare to that will need receiving stations to interpret it as a collision. The question specified that the IP packet to be transmitted by Ethernet as 60 bytes long. The header fields here can occupy 18 bytes, Then total frame size becomes 78 bytes. With the total frame size of 78 bytes(60 bytes+ 18 bytes) we can see it has exceeded the 64-byte minimum. Hence there is no padding used.

6 0
3 years ago
Marissa, a 21-year-old young woman, is working as an intern at a software company. She has recently graduated from college. She
Zigmanuir [339]

Answer:

She is experiencing the features of feeling in between.

Explanation:

Because she graduated from college currently and she thinks about moving seriously with her boyfriend or best friend and she also thinks about the convenience and safety which she gets in her parents' house. She confused because she is not completely in the adult stage and currently, she passed through from the stage of adolescence, so that's why she experiencing feeling in between.

3 0
4 years ago
Other questions:
  • Assume a 8x1 multiplexer’s data inputs have the following present values: i0=0, i1=0, i2=0, i3=0, i4=0, i5=1, i6=0, i7=0. What s
    8·1 answer
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • The R1 shell opens in a terminal window with black text and white background. What user is logged into
    8·1 answer
  • NO BODY KNOWS! How old is Cynthia Blaise!?
    7·1 answer
  • The process of auditing the source code for an application to verify that the proper security controls are present, that they wo
    14·1 answer
  • What are like arms surrounding all the other code blocks?
    11·2 answers
  • 4. Why does Hancock believe that our communication online is more honest than we might<br> expect?
    15·2 answers
  • Write a python statement that print the number 1000
    6·1 answer
  • Horizontal and vertical flips are often used to create ___.
    12·1 answer
  • What electronic devices do you use more frequently? And how much time do you use them?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!