1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vaieri [72.5K]
3 years ago
7

Im bored anyone up for a convo? lets talk.. =D

Computers and Technology
2 answers:
aleksandrvk [35]3 years ago
6 0

Answer:

ok im fine with dat <3

Mashcka [7]3 years ago
4 0

Answer:

your bored enough to want to talk on brainly

Explanation:

You might be interested in
What will be displayed as a result of executing the following code?
patriot [66]

Answer:

d

Explanation:

7 0
2 years ago
Were can i watch unexpected free season 3
Vesna [10]

Answer:

Netflix

Explanation:

3 0
2 years ago
An internet ________ is a collection of utility programs designed to maintain your security and privacy while you are on the web
Kazeer [188]

An<u> internet security suites </u>is a collection of utility programs designed to maintain your security and privacy while you are on the web.

<h3>What is Internet Security Suite?</h3>

As the name is called, an Internet Security Suite is known to be a kind of a protection services where all your security requirement are known to be in one package.

Note that they are called an all in one computer security packages that a person can have and it come with an anti-virus scanner, as well as an anti-spyware scanner, email protection, and others.

Therefore, An<u> internet security suites </u>is a collection of utility programs designed to maintain your security and privacy while you are on the web.

Learn more about internet security suites from

brainly.com/question/16341928
#SPJ1

4 0
11 months ago
In an ha configuration, which two failure detection methods rely on icmp ping? (choose two.)
Hunter-Best [27]
I believe that the multiple questions attached to this question is 

a) Hello
b) Link groups
c) Path groups
d) Heartbeats

The Answer is B and C
The physical interfaces that are supposed to be monitored are connected into a link group and a firewall failure can be triggered when one or all physical interfaces in the group failPath Monitoring helps monitor the full path to mission critical IP addresses. By default, any one of the IP addresses becoming unreachable will end up causing the firewall to change the HA to tentative state
7 0
2 years ago
If I make a Zoom Meeting, would you join it?
boyakko [2]

Most likely, yeah lol.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Plz answer these questions...those who give answer get the brainliest......hurry up..!!!​
    14·1 answer
  • If Denise specifies Jan? as a search criterion, Excel will locate all of the following records EXCEPT ____.
    9·1 answer
  • 1. ___________ ensures the integrity and security of data that are passing over a network.
    13·1 answer
  • The instructions for a computer program are sometimes referred to as . computer programmers focus on computer programs, but they
    5·2 answers
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    10·2 answers
  • What goals do you set for yourself while studying?
    9·2 answers
  • Why is lateral reading an important tool when reading material in social media or any online source
    15·1 answer
  • Running away from home
    11·2 answers
  • Why would over-50 executives have a harder time buying into the idea of social media?​
    15·1 answer
  • How many ways are used to insert an image from file?koi h kya​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!