1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
3 years ago
6

FIGURE A-1—Use the information in this chart to answer Question 1.

Computers and Technology
1 answer:
Luba_88 [7]3 years ago
5 0
A the breaker point gap is to small
You might be interested in
I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRIST AND CORRECT
forsale [732]

Answer:

Act like search engines

Explanation:

They will give you intel on about basically anything and they have their own opinion on it aswell‍♀️

4 0
3 years ago
Read 2 more answers
Suppose Alice and Bob are sending packets to each other over a computer network. SupposeTrudy positions herself in the network s
Elden [556K]

<u>Explanation:</u>

  • can observe the contents of all the packets sent and even modify the content.
  • can prevent packets sent by both parties from reaching each other.

From a network security standpoint, since we are told that Trudy <em>"</em><em>positions herself in the network so that she can capture all the packets sent", </em>it, therefore implies that the communication between Alice and Bob is vulnerable to modification and deletion.

6 0
3 years ago
A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP addres
Mariulka [41]

Answer:

A Subnet Mask

Explanation:

A Subnet mask is used by the TCP/IP protocol to determine whether a host is on the local Subnet or on a remote network.

In TCP/IP, the parts of the IP address that are used as the network and host addresses are not fixed, so the destination host address 192.168.10.100 cannot be determined by the network host (192.168.10.200) unless it has more information. This information is supplied in another 32-bit number called a Subnet mask.

4 0
4 years ago
What would you need to have on your foley stage
LUCKY_DIMON [66]
<span>You will need many props for your Specific tracks (whatever you see in the film!). It's impossible to say what you will need until you see the picture and as time goes by you will add to your collection (if you have space!) - garbage day in my neighborhood is 'golden day' as I collect some of best props from the stuff people throw out: old bicycles, doors, sinks, wood, metal, desks, etc.</span>
4 0
3 years ago
In which scenario would you view Word data in Excel?
s344n2d4d5 [400]

A. You want to analyze data from a table within a report, with functions and chats.

6 0
3 years ago
Other questions:
  • Why is the show "Insatiable so awesome?
    12·2 answers
  • A cover letter is written directly to (a) _____.
    13·1 answer
  • Consider the following relational schema, where the primary keys are Bold,
    7·1 answer
  • Splunk uses ________ to categorize the type of data being indexed..
    11·2 answers
  • Will a pair of bar magnet ,with keepers on the two ends, act as a magnet
    13·1 answer
  • The text discusses three different steps when processing input. Which of the following is (are) one of those steps? (Check all t
    8·1 answer
  • List 7 basic internal component found in a computer tower?
    11·2 answers
  • Clunker Motors Inc. is recalling all vehicles from model years 2001-2006. Given a variable modelYear write a statement that prin
    9·1 answer
  • 66 POINTS HELP
    6·1 answer
  • Identify the two top benefits of using angel investors to start a business.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!