1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
8

9. DIMMs used in servers can provide additional reliability if they use what specific technology.

Computers and Technology
1 answer:
Masteriza [31]3 years ago
3 0

Answer:

fgjdgf answer is a fydgdtxgxxgxggxgx

You might be interested in
ABC Manufacturing Company is located in Hiroshima, Japan. Being prone to earthquakes, the company decided to implement a backup
maxonik [38]

The command interface protocol that I would suggest to the IT administrator is Secure Shell (SSH).

<h3>What is a command interface protocol?</h3>

A command interface protocol can be defined as a standard protocol that is designed and developed to processes commands in the form of lines of text to a software program that is installed on a computer system.

<h3>The types of command interface protocol.</h3>

In Computer technology, there are different types of command interface protocol and these include:

  • SSL
  • TLS
  • SSH

SSH is an acronym for Secure Shell and it is a standard network protocol that gives a IT administrator a secure way to access data over an unsecured network, especially when backing up data.

Read more on SSH here: brainly.com/question/17147683

7 0
2 years ago
Research the Next-Generation IPS (NGIPS) solutions involving four primary editions including FirePOWER 8000/7000 series, NGIPS f
dezoksy [38]

Answer:As cyber attacks evolve, network security requires unparalleled visibility and intelligence covering all threats for comprehensive protection. And with differing organizational responsibilities and agendas, you need a consistent security enforcement mechanism. These increasing operational demands call for a renewed focus on dedicated NGIPS to provide a deeper level of security and visibility for the enterprise.

Explanation:

6 0
3 years ago
In addition to librarians, what other type of worker would you expect to find employed in a school or library
diamong [38]
In a school or library you can find a managor or boss

3 0
4 years ago
Read 2 more answers
For a list of numbers entered by the user and terminated by 0, find the sum of the positive number and the sum of the negative n
Katena32 [7]

Summarize all positive numbers as follows: + It's good. The total of all negative numbers is:, write it down. + Unfavorable.

<h3>What is C++ language?</h3>

C++ language is defined as a general-purpose programming language that supports procedural, object-oriented, and generic programming and is case-sensitive and free-form.  As well as being used for in-game programming, software engineering, data structures, and other things, C++ is also utilized to create browsers, operating systems, and applications.

An application that adds all positive integers and stores them in variables, as well as adding all negative numbers and storing them in variables. The software should print the values for both variables at the conclusion and compute their average. When the user enters a zero, the software should terminate.

Thus, summarize all positive numbers as follows: + It's good. The total of all negative numbers is:, write it down. + Unfavorable.

To learn more about C++ language, refer to the link below:

brainly.com/question/1516497

#SPJ1

8 0
1 year ago
True or false: if we’re short side the subject in our composed frame, we have given the subject the maximum amount of “lead room
denis-greek [22]
I think it’s false I’m not to sure
3 0
3 years ago
Other questions:
  • Write a unit test for addInventory(). Call redSweater.addInventory() with parameter sweaterShipment. Print the shown error if th
    9·2 answers
  • Write a program whose input is two integers and whose output is the two integers swapped. Place the values in an array, where x
    12·1 answer
  • Technology that is attached to a tag and used to identify postal packages is a(n) _____.
    12·2 answers
  • What is the syntax of an of if statement
    13·1 answer
  • What is the name of the worm that was written in 1988 that could replicate itself across computers on the internet?
    7·1 answer
  • Moore’s law states that the number of transistors on integrated circuits doubles approximately every two years?
    15·2 answers
  • Spreadsheet software can be used to do all the following except _____.
    5·2 answers
  • Will mark brainliest
    14·1 answer
  • Ingredient Adjuster
    11·1 answer
  • explain how principles of computational thinking skills are applied in finding solutions that can be interpreted into software a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!