1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivolga24 [154]
3 years ago
8

Answer to correct answer to numb 21

Computers and Technology
2 answers:
Varvara68 [4.7K]3 years ago
4 0

*$M$3/4

this is answered first

mars1129 [50]3 years ago
4 0

The answer is *$M$3/4. Hope I helped and have a great day/night!!!!!! ❤️

You might be interested in
Which is true about routers and switches?
Julli [10]

Answer:

Routers control traffic between networks while switches control traffic within a network

Explanation:

There are different devices involves in computer networking. These devices include hub, switch, router and other components.

Switch is used to connect the computer with in the network. It controls the traffic between different computers within the network. Different computers are connected with each other through different cables with the help of switch.

On the other hand, different LAN's connected through the cable with a router to communicate with each other. This device is used to control the traffic between different networks.

 

8 0
3 years ago
In what type of attack does the adversary leverage a position on a guest operating system to gain access to hardware resources a
il63 [147K]

Answer:

VM escape attack

Explanation:

<em>In a VM escape attack, the attacker exploits hypervisor vulnerabilities to gain control over resources reserved for other guest operating systems. Services operating on the guest may be exposed to the other attacks, but such attacks can only access data allotted to the same guest. In the event of a buffer overflow or directory traversal or the client in the case of cross-site scripting.</em>

6 0
2 years ago
Sam has created a fashion website. There are many subscribers to his website. He has added new blogs, pictures, and articles abo
marusya05 [52]

Answer:

Post advertisements on social media and message the subscribers.

Explanation:

There is no point in not promoting and putting forward the work that he has been doing. All of the given options are about promoting the content but Sam needs to choose the ones which are efficient and seem professional as well.

Posting advertisements about the website promotes the content on a wider base and helps in luring more and more people to the website.

Messaging or sending an email to the subscribers is a healthy of letting the subscribers about the updates and latest posts.

8 0
4 years ago
you have a small network in your business with just a few network devices connected along with 22 linux computers and you want t
alekssr [168]

Answer: traceroute

Explanation: Hope this helps <3

8 0
4 years ago
If Word finds a potential error in a document, a red, green, or blue wavy underline flags the problem. True or False
faust18 [17]

Answer: True

Explanation: The potential error in Word is defined as the error that arises when it tries to post some content or text but the user is not sure whether it is posted or not.In Word, the error is relate top the spellings, phrase,grammar etc, in which the Word tries to give alternatives to the particular word or text.

The error is marked with the underline that can be red which means the spelling is incorrect ,green shows some grammatical error and blue is for the inconsistency in the format. Thus, the given statement is true.

3 0
3 years ago
Other questions:
  • Almost all PCs have this type of serial connector
    8·1 answer
  • Why is the show "Insatiable so awesome?
    12·2 answers
  • A man travel 200m towards east&lt;br /&gt;from his house then takes left&lt;br /&gt;to turn and moves 200 m north&lt;br /&gt;fin
    14·1 answer
  • Dereck works for long hours on his computer. He frequently experiences physical strain by the end of the day because he does not
    13·2 answers
  • Which function of InfoSec management encompasses security personnel as well as aspects of the SETA program?
    5·1 answer
  • What does the following if statement do?<br><br> if (num1 == Math.abs(num1))
    12·1 answer
  • Which of the following are examples of third party software that banks use? (Select all that apply.)
    5·1 answer
  • What is the deffirentiates in organs from tissues
    11·1 answer
  • What are the two basic literary forms?
    12·1 answer
  • Write short notes on the following:<br>I. keyboard ii.Control unit iii.printer​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!