1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goblinko [34]
3 years ago
7

How can you get in touch with someone when they ain't answering you ☹

Computers and Technology
1 answer:
mixer [17]3 years ago
3 0
You can go to their house and talk to them
You might be interested in
IoT is the interconnection of what?<br> Hardware<br> Networks<br> Everyday devices<br> Cables
Natalka [10]

Answer:

Everyday Devices

Explanation:

As we know that Internet of Things (IOT) include connected security systems, thermostats, cars, electronic appliances, lights in household and commercial environments, alarm clocks, speaker systems and vending machines.

3 0
3 years ago
Consider a situation in which a cyberterrorist makes all the dns servers in the world crash simultaneously. how does this change
LiRa [457]
<span>DNS can be thought of as a phone book for the Internet. It translates the url/web address( like name) to the IP address ( like number)</span>
4 0
4 years ago
Which of the following data recording procedures is best used for behaviors that have a clear ending and beginning, do not occur
nordsb [41]

Answer:

a. partial interval

Explanation:

Partial Interval data recording method of data collection involves recording whether an event occurs or does not during a defined interval.

It is different than <em>whole interval</em> data recording because partial interval doesn't occur throughout the entire interval.

In partial interval recording, <em>discrete behaviors</em> are observed. For example, this kind of behavior can be a person swearing or hitting to someone, a student participating in class discussions etc.

8 0
3 years ago
Which of the following forces all traffic, communications, and activities through a single pathway or channel that can be used t
Ad libitum [116K]

Answer:

Option b. Choke point

Explanation:

In firewall, a choke point can be defined as a single point which allows all of the network traffic including incoming and outgoing to be funneled. As the passage of the whole traffic through the choke point regulates the flow as it focus monitoring  and controls bandwidth consumption, provides authentication, control efforts like Internet firewalls.

7 0
3 years ago
A ____ is commonly a single device or server that attaches to a network and uses TCP/IP-based protocols and communications metho
Andrews [41]

Answer: Network-attached storage

Explanation:

Network-attached storage is the data storage server that is  attached with computing system for providing accessing ability to different client groups and various other users .

  • They can recollect the data the main location that holds the file-level data .
  • This device is connected with the network and uses TCP/IP-related and other file sharing protocol for functioning of data and file access in online data storage connection

7 0
3 years ago
Other questions:
  • For local travel addresses and street names should be
    14·1 answer
  • There is no reason to study the works of famous photographers because they will make you less creative.
    5·2 answers
  • Ignorance of policy is a legal excuse for an employee. TRUE or FALSE
    11·1 answer
  • Look at the following code:
    7·1 answer
  • Program MATH_SCORES: Your math instructor gives three tests worth 50 points each. You can drop one of the test scores. The final
    7·1 answer
  • A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network techni
    5·1 answer
  • How to write conclusion of hard disk​
    11·1 answer
  • So if brainly teaches me better why do we even have real life teachers??????
    5·1 answer
  • What makes up the cloud in cloud computing ?
    8·1 answer
  • What level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!