1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
statuscvo [17]
3 years ago
9

What kinds of dogs are there

Computers and Technology
2 answers:
drek231 [11]3 years ago
5 0
There are al types of dogs what specific breed are you looking for

Studentka2010 [4]3 years ago
3 0
Dalmatian, German Shepard, Great Dane, Rottweiler, Chihuahua, Pit Bull, Boxer, Beagle, Hound, Lab, Golden Retriever, and then there's a lot of different mixes (mutts).   <span />
You might be interested in
Information security is defined as practice of preventing unauthorized access, use, disclosure, disruption, modification, or ___
Elena-2011 [213]

Answer:

destruction

Explanation:

destruction is also the property of information in which unintended users sabotage the information so that it becomes useless for both the owner and the user as well.

5 0
3 years ago
A program similar to mtr, ____, is available as a command-line utility in Windows operating systems.
KATRIN_1 [288]

Answer:

pathping

Explanation:

3 0
3 years ago
Rachel is a junior system administrator for a network with a single Active Directory domain. The network has just expanded to in
Pepsi [2]

Answer: Ask a member of the Enterprise Admins group to authorize the server.

Explanation:

From the information given, we are informed that Rachel installed a new server running Windows Server 2016 on the new subnet and configure it as a DHCP server but then realizes that the DHCP server service has started, but that the server does not respond to DHCP lease requests.

In this case, the reason for this can be attributed to the fact that the server hasn't been authorized, therefore, she can ask a member of the Enterprise Admins group to authorize the server.

4 0
3 years ago
What is the Explicit Dependencies Principle? Explain why explicit dependencies are better than implicit dependencies.
Zanzabum

Answer:

Explanation:

Explicit Dependencies

<u>It states that the classes and methods should explicitly require , via constructor or method parameters all the collaborating objects that are required for the function to work properly .</u>

Classes with the implicit dependencies cost very high for the maintenance than the explicit dependencies .

Even , the implicit dependencies are difficult to test as they are tightly coupled to their collaborators .

8 0
4 years ago
Which option is an appropriate database function syntax?
kodGreya [7K]

Answer:

=DSUM(A4:D8, "Unit Cost", A1:B2)

Explanation:

From the list of given options, it's obvious that the question relates to Excel database sum function.

The correct answer among the list of options is:

=DSUM(A4:D8, "Unit Cost", A1:B2)

Where

DSUM represents the function itself

A4:D8 represents the range

"Unit cost" represents the field

and

A1:B2 represents the criteria of the function

Analysing other options:

Option 1: The equality sign (=) before excel formulas is missing

Option 2: Sum is used instead of DSUM and there's a missing bracket before the range

Option 3: There's a missing comma between the range, the field and the criteria

Hence, the last option (4) answers the question.

5 0
3 years ago
Read 2 more answers
Other questions:
  • The memory allocated for a float value is ____ bytes.
    9·1 answer
  • Clicking on the Spelling &amp; Grammar button is one way to correct a spelling error in Word. Please select the best answer from
    7·2 answers
  • Where does microsoft word put elements such as text, logos, or graphics saved for later use in a document?
    15·1 answer
  • One of the Employee responsibilities to LOTO is:
    5·1 answer
  • What is built on integrated circuits and carries the electrical current? CPUs Data Software Transistors
    5·1 answer
  • What is a piece of information sent to a function
    15·1 answer
  • Why won’t my Nintendo Switch connect to the internet?
    7·1 answer
  • What is the purpose of the New Window command?
    7·2 answers
  • The process of auditing the source code for an application to verify that the proper security controls are present, that they wo
    14·1 answer
  • Which item is developed last in the cyclical design process
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!