1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka [77]
4 years ago
14

Need help with this please

Computers and Technology
2 answers:
Naily [24]4 years ago
5 0

15.A

16.D

17.D

18.A

19.A

20.A

21.C

22.D

23.A

24.D

25.B

HOPE THIS HELP CAN YOU MARK ME AS BRAINLEST

bekas [8.4K]4 years ago
5 0

There you go: (pic)


(the red mark is the answer)



Hope this helped, and if it did:

<h2><u><em>**PLEASE MARK BRAINIEST**</em></u></h2><h2><u><em /></u></h2>

<em>have a good day :)</em>

You might be interested in
What is the name of the function below?<br><br> function go(){<br> alert("hello everybody");<br> }
labwork [276]

Answer:

It’s Java script I think and it makes something say hello everybody

Explanation:

6 0
3 years ago
For your biology class, you have taken a number of measurements for a plant growth experiment. You wish to create a chart that s
Mamont248 [21]
Calc or excel
Hope this helps
4 0
3 years ago
A person appreciation of a food taste and flavor is commonly referred to as what
Nimfa-mama [501]

Answer:

Palate - A person’s appreciation of taste and flavor, especially when sophisticated and discriminating Eclectic - Deriving ideas, style, or taste from a broad and diverse range of sources Piquancy - A pleasantly sharp and appetizing flavor

6 0
3 years ago
An early attempt to force users to use less predictable passwords involved computer-supplied passwords. The passwords were eight
Sedaia [141]

Answer:

Recently, with the new and advanced hacking algorithms and affordable high-performance computers available to adversaries, the 36 character computer suggested passwords can easily be insecure.

Explanation:

The 8 length passwords generated pseudo-randomly by computers are not secure as there are new algorithms like the brute force algorithm that can dynamically obtain the passwords by looping through the password length and comparing all 36 characters to get the right one.

And also, the use of high-performance computers makes these algorithms effective

7 0
3 years ago
Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.
vredina [299]

Answer:

The answer is "Option c"

Explanation:

In the given question only option c is correct because "/27" is the IP "255.255.255.224" is the same as "/27" in the terminology in CIDR, in which it uses the compact IP address as well as corresponding prefix expression and it terminology consists of an IP with a slash ('/') or a decimal number. Its count of 1-bit proceeding to the mask traditionally referred to it as the network mask.

5 0
3 years ago
Other questions:
  • The _____ is the area in Microsoft Excel where you can perform file commands such as Save, Open, and Print
    15·1 answer
  • A file extension of .xlsx means that the file contains what? *
    12·2 answers
  • Write a Python program to do the following: (a)Use a for loop and a random integer generator to generate 5 random integers in 1
    10·1 answer
  • When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing
    15·1 answer
  • A marketing associate wants to use the Validate button to ensure an email is CAN-SPAM compliant. What information does the assoc
    5·2 answers
  • What important practice can help prevent hardware trouble?
    6·1 answer
  • A process at Host C receiving two incoming UDP segments from two different hosts will know that they originated from two differe
    14·2 answers
  • Which of the following does not represent the function of a Variable? Variables store data in memory; this data has limited use
    8·1 answer
  • So, I have an Cru__ on this boy in school and his name is Bray but Yeah.............Can someone help me
    10·2 answers
  • Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!