1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harina [27]
4 years ago
9

What is an effective way to record change management? (5 points)

Computers and Technology
1 answer:
yanalaym [24]4 years ago
3 0

Answer:

Detailed Notes

Explanation:

I took the 2.04 quiz

You might be interested in
You are using a polynomial time 2-approximation algorithm to find a tour t for the metric traveling salesman problem. Which of t
Svet_ta [14]

Answer:

B. The cost of tour t is at most twice the cost of the optimal tour.

Explanation:

You are using a polynomial time 2-approximation algorithm to find a tour t for the traveling salesman problem.

The cost of tour t is at most twice the cost of the optimal tour

The equation represented as Cost(t) <= 2 Cost(T)

Where

Cost (t) represents cost of tour t

Cost(T) represents cost of the optimal tour

3 0
3 years ago
You are trying to appreciate how important the principle of locality is in justifying the use of a cache memory, so you experime
murzikaleks [220]

Answer:

Explanation:

Attached is the solution

3 0
3 years ago
The transport layer must break messages from the application layer into several _____ that can be sent to the network layer
Pie

The transport layer must break messages received from the application layer into several <u>packets</u> that can be sent to the network layer.

<h3>The layers of the OSI model.</h3>

In Computer networking, there are seven main layers in the open systems interconnection (OSI) model and these include the following in a sequential order;

  • Physical Layer
  • Data link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer

As a standard, it is a must that the transport layer break messages that are received from the application layer into several <u>packets</u> that can be sent to the network layer.

Read more on transport layer here: brainly.com/question/26177113

#SPJ12

8 0
2 years ago
What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively? answer
drek231 [11]
Telnet or rsh and ssh, http and https, ftp and sftp or ftps ? How are you accessing the server?
8 0
3 years ago
What do you like to play
Ad libitum [116K]

Answer:I like to play sports

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Spreadsheet software creates a ____, composed of a grid of columns and rows
    6·1 answer
  • What is the name of the relationship between two ospf devices that are connected together and exchange link-state information?
    14·1 answer
  • What is this system's reliability at 700 hours? Component failure data is: Failure Rate of A = 0.0007 failures/hour Reliability
    9·1 answer
  • Write a program that asks the user for the names of two files. The first file should be opened for reading and the second file s
    13·1 answer
  • Is USA TestPrep a test-taking site that won't let you access other windows without kicking you off?
    13·1 answer
  • What is an example of a use for an icon set?
    6·1 answer
  • Is my document folder located at taskbar​
    12·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • HELPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP!!!
    12·1 answer
  • Which statement best characterizes under what circumstances you should add your social media profile to a resume? You should add
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!