1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rina8888 [55]
3 years ago
12

Write a report on the recent online tuition

Computers and Technology
1 answer:
ale4655 [162]3 years ago
8 0

Answer:

dgvhgfh

Explanation:

fghdfgh

You might be interested in
Each vertex in a graph of n bertices can be the origin of at most ____edges
EastWind [94]

Answer:

B. n-1

Explanation:

If there are n vertices then that vertex can be origin of at most  n-1 edges.Suppose that you have a graph with 8 vertices you can select a vertex from these 8 vertices now you have 7 other vertices.So the vertex you selected can have at most 7 edges or it can be origin of at most 7 edges.So we conclude that the answer is n-1.

6 0
3 years ago
How do you comment on someone's answer on Brainly???
Semenov [28]
Press ANSWER , and reply
5 0
3 years ago
You have implemented a network where each device provides shared files with all other devices, what kind of network is it?
Reil [10]

It is a Peer-to-peer type of network when you have implemented a network where each device provides shared files with all other devices.

So the answer is Peer-to-peer.

8 0
2 years ago
you are configuring a server that will be used by an external organization. what is required when you install the ad fs role on
agasfer [191]

you are configuring a server that will be used by an external organization. <u>Web Application Proxy servers</u> Web Application Proxy servers.

What is a proxy server?

A proxy server i<u>s a server program used in computer networking that stands between a client and the server supplying the resource that the client is requesting</u>. A proxy server is a server program used in computer networking that <u>stands between a client and the server</u> supplying the resource that the client is requesting.

Proxies add a <u>significant degree of protection to your machine.</u> They can be configured as firewalls or web filters to defend your computer against online dangers like viruses.

<u>This added security from a </u><u>proxy </u><u>server is also beneficial when used in conjunction with a secure web gateway or other email security tools</u>. Using this method, you can filter traffic based on the level of security it offers or the volume of traffic your network—or certain computers—can handle.

To learn more about proxy server, use the link given
brainly.com/question/9257742
#SPJ4

8 0
1 year ago
Information security is defined as practice of preventing unauthorized access, use, disclosure, disruption, modification, or ___
Elena-2011 [213]

Answer:

destruction

Explanation:

destruction is also the property of information in which unintended users sabotage the information so that it becomes useless for both the owner and the user as well.

5 0
3 years ago
Other questions:
  • Write a program that loops one thousand times. add all the even numbers and display the results. add all the odd numbers and dis
    13·1 answer
  • What is the definition of a server?
    11·1 answer
  • To under a clip art you must do the following.
    14·1 answer
  • What do economists call a decline in the real GDP combined with a temporary rise in price level?
    8·2 answers
  • In the URL, what is the subdomain and what is the domain name?
    5·1 answer
  • What is the best platform for a online meeting?
    10·2 answers
  • Will give brainly if answer all or my questions
    8·1 answer
  • How are sorting tools helpful for using spreadsheets and databases? Sorting tools let you locate information by searching for na
    14·2 answers
  • Which Windows registry hive stores information about object linking and embedding (OLE) registrations
    11·1 answer
  • A keyboard would be considered what 2 things
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!