1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
3 years ago
9

Which of the following provides services to hosts on its network?

Computers and Technology
1 answer:
Nina [5.8K]3 years ago
3 0

Answer:

Server

Explanation:

a computer or computer program which manages access to a centralized resource or service in a network.

You might be interested in
What is digital revolution?
oksano4ka [1.4K]
The Digital Revolution refers to the advancement of technology from analog electronic and mechanical devices to the digital technology available today. The era started to during the 1980s and is ongoing. ... The Digital Revolution is sometimes also called the Third Industrial Revolution.
5 0
3 years ago
You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r
Irina-Kira [14]

Answer:

A. True.

Explanation:

In this scenario, you are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19): Protecting Whistleblowers with Access to Classified Information.

In USA, the Presidential Policy Directive 19 (PPD-19) which was signed by President Barack Obama in October 2012, is an executive order designed to provide significant protection for an employee who have access to classified informations such as fraud, waste of money and abuse or prohibiting any form of retaliation against this cleared employee.

3 0
3 years ago
Describe and evaluate the working memory model of memory (16 marks)​
Lyrx [107]

Answer: The working memory model is a cognitive model of short term memory comprised of three main components; the central executive, the visuo-spatial sketchpad and the phonological loop. ... they suggests the components of working memory all have limited capacity.

5 0
3 years ago
Write a function merge that merges two lists into one, alternating elements from each list until the end of one of the lists has
Anna007 [38]

Explanation:

The program that merges two lists or two arrays is written below;

Code :

void main void

{

char [] arr1= {'1','2','3'};

char [] arr2= {'a','b','c','d','e'};

int l1= arr1.length;

int l2=arr2.length;

int l3=l1+l2;

char [] arr3=new char[l1+l2];

int i=0;

int j=0;

int k=0;

int m=0;

int r=0;

if(l1<l2)

   r=l1;

else

   r=l2;

while(m<r)

{

   arr3[k++]=arr1[i++];

   arr3[k++]=arr2[j++];

   m++;

}

while(k<l3)

{

   if(l1<l2)

       arr3[k++]=arr2[j++];

   else

       arr3[k++]=arr1[i++];

}

for(int n=0;n<l3;n++)

{

   System.out.print(arr3[n]+" ");

}

}

5 0
3 years ago
2. During the information-gathering process, you want to make sure you address a list of highly technical questions concerning t
zalisa [80]

Answer:

A. Review of business documents

Explanation:

In information gathering process some research or resolving some technical issue, it is necessary to gather data or enlist highly technical questions concerning the overarching system that is already in place.

To gather answers that are enlisted above can be answered with the help of literature review or review of business document.

Literature review is the review of past work related to some particular topic that can be gather from different journal articles, conference publications or book.

3 0
3 years ago
Other questions:
  • based on the transcript, what did broadcasting the story through the medium of radio allow welles to do?
    8·1 answer
  • What is cyber safety?
    14·1 answer
  • When should you use the Reply All function when replying to an email
    10·2 answers
  • What was the first e-commerce service?
    10·1 answer
  • What characters cannot be used in a filename?
    15·1 answer
  • Which statement describes one drive?
    6·1 answer
  • Which of the following bit patterns represents the value -9 in two’s complement notation?
    15·1 answer
  • Assslainsdffddsvvdesdssbhasasco5m
    5·2 answers
  • Hello i need help whats -5 = 500
    13·2 answers
  • Select the three concepts of capital outlay.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!