1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
borishaifa [10]
2 years ago
10

What was developed in the 1970s as a way to provide sufficient network access so diskless workstations could access startup info

rmation across the network, instead of reading it from a local disk drive?
Computers and Technology
1 answer:
DedPeter [7]2 years ago
5 0

Answer:

The Bootstrap Protocol (BOOTP)

Explanation:

Based on the information provided within the question it can be said that the technology that is being described in this scenario is known as The Bootstrap Protocol (BOOTP). This refers to a computer networking protocol which automatically assigns an IP address to a network device from a configuration server, which in the 70's would allow diskless workstations to access startup information across the network.

You might be interested in
When might be the best time to start saving for retirement?
Nata [24]

Answer

At the earliest possible date.

Explanation

Retirement is the act of leaving your job and stopping working, usually because you are old: Your retirement benefit is based on your highest years of earnings and savings and your age when you start receiving benefits. consistently saving a little money for retirement at the earliest possible date.is much better than saving a lot more money when you are in your fifties.

4 0
3 years ago
Read 2 more answers
I have been trying to work on this for a while now, and this is on excel
cluponka [151]

Answer:

=IF(INDEX(INDIRECT(C10), B10)=0,"",INDEX(INDIRECT(C10), B10))

Or

=IF((INDEX((INDIRECT(Dept,TRUE)),Reason))="","",(INDEX((INDIRECT(Dept,TRUE)),Reason)))

Explanation:

Given

Your formula:.

=INDEX(INDIRECT("Dept"),Reason)

Dept column = C (C10)

Reason field = B (B10)

The issue with your formula is that you failed to include a statement to test the falsity of the first condition; in other words, if your if statement is not true, what else should the formula do.

The question says that

"Nest the function inside an IF function so that issues currently displaying as a 0 will display as a blank cell" this means that

if the INDEX() function returns 0, a blank should be displayed in H10 blank, instead.

So, the right formula both of these two. You can use any of them

1. =IF(INDEX(INDIRECT(C10), B10)=0,"",INDEX(INDIRECT(C10), B10))

2. =IF((INDEX((INDIRECT(Dept,TRUE)),Reason))="","",(INDEX((INDIRECT(Dept,TRUE)),Reason)))

The two does the same function; the only difference is that

(1) considers the cell itself while (2) considers the contents of the cell.

The analysis of both is that

They both use a nested indirect reference to check for the content of cells displaying 0.

The first if checks for the above mentioned; if yes, cell H10 is made to display a blank else it's original content is displayed.

8 0
2 years ago
Head-mounted displays often use organic light emitting diode,or technology.
nydimaria [60]

Organic light emitting diode,

Technology is a category not a specific thing

7 0
3 years ago
____ is one of the primary operations of a computer.
Romashka [77]
Processing <span>is one of the primary operations of a computer.</span>
7 0
2 years ago
A digital certificate system: Group of answer choices uses digital signatures to validate a user's identity. is used primarily b
kompoz [17]

Answer:

uses third party CAs to validate a user's identity

Explanation:

The Digital Certificate is the only means that technically and legally guarantees the identity of a person on the Internet. This is an essential requirement for institutions to offer secure services over the Internet. Further:

The digital certificate allows the electronic signature of documents The recipient of a signed document can be sure that it is the original and has not been tampered with and the author of the electronic signature cannot deny the authorship of this signature.

The digital certificate allows encryption of communications. Only the recipient of the information will be able to access its content.

4 0
3 years ago
Other questions:
  • Write the interface (.h file) of a class ContestResult containing: An data member winner of type string, initialized to the empt
    14·1 answer
  • Create a new file that contains a summary of the total consumption for three sectors: "Residential," "Commercial," and "Industri
    10·1 answer
  • What are the ethical implications of online social media after someone has died
    8·2 answers
  • Write the function header (the first line of the function definition) to define a function named DisplayStats that accepts a str
    5·1 answer
  • Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a
    5·1 answer
  • Describe the uses of computer in different fileds? please help me ​
    14·1 answer
  • What is lossless compression
    6·2 answers
  • Write a program that repeatedly reads in integers until a negative integer is read. The program keeps track of the largest integ
    9·1 answer
  • The web design teams of a company are working on designing websites for various companies, Pick the ideas that employ proper use
    13·1 answer
  • Briefly describe the working of computer processing system?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!