1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
8

अस्स्मन्चचरे ------------------- दृश्यते |

Computers and Technology
1 answer:
Semmy [17]3 years ago
4 0

Answer:

5?

Explanation:

You might be interested in
A ____ is a prewritten formula that is built into excel.
kondor19780726 [428]
A function is a prewritten formula that is built into excel.
3 0
4 years ago
What are building blocks? select three options.
mr Goodwill [35]

Answer:

Content that has been formatted

Content that is stored as templates

Content that is stored in galleries

Explanation:

These are the answers because that’s just what they are

7 0
4 years ago
Context-based signatures match a pattern of activity based on the other activity around it, such as a port scan. true and false
valina [46]

Answer:

The given statement is "True".

Explanation:

  • Context-based signatures become wired networks on either the incoming packet's information. Documentation included within the IP headers has been used to stimulate a certificate or stamp based on the scenario.
  • The whole category of signatures examines congestion and how much it appears to fit through the other pedestrians which mostly surrounds it.

So that the above is the true answer.

7 0
3 years ago
When on a LAN switch DHCP snooping is configured the networks that can be accessed by which clients?
kompoz [17]

Answer:

The network is accesible just for the whitelisted clients configured in the switch connected to the DHCP server

Explanation:

DHCP snooping main task is to prevent an unauthorized DHCP server from entering the our network.

Basically, in the switch we define the ports on which the traffic of the reliable DHCP server can travel. That is, we define as “trust” the ports where we have DHCP servers, DHCP relays and trunks between the switches.

8 0
4 years ago
Which of the following best describes a situation where software should be upgraded instead of replaced? A three-year-old laptop
Karo-lina-s [1.5K]
The six month old computer that needs more RAM is the answer. it is the only one using software.
6 0
4 years ago
Other questions:
  • Java Question-5 Declare and initialize two variables called first and second. Write a single statement that will print the messa
    15·1 answer
  • Whoever answers int the next 15 minutes will get brainliest. To get brainliest, it also has to be the correct answer. 8 points r
    11·2 answers
  • In C++ :
    6·1 answer
  • Hard and soft skills can both be transferable skills. *<br><br> True<br><br> False
    5·2 answers
  • What is LINUX?
    6·2 answers
  • A proposal is also known as a
    14·2 answers
  • ______ view is generally used for creating, formatting and designing slide​
    13·1 answer
  • When a called function completes its task, it normally:_________a. logs its results b. terminates program execution normally c.
    5·2 answers
  • What is a computer ?​
    12·2 answers
  • Which of the following correctly calculates the
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!