1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mixas84 [53]
3 years ago
7

3. Which of the following is a single piece of information related to the person, place,

Computers and Technology
2 answers:
stepan [7]3 years ago
8 0
I think the answer is field
Pie3 years ago
4 0
Answer is B. Field xxxxx
You might be interested in
Question 1 Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?
Artyom0805 [142]

There are different aspect of computing. The portion of the PuTTY package that allows you to perform file transfers using the SCP (Secure Copy) protocol is pscp.exe.

The pscp.exe tool commonly called the PuTTY Secure Copy Client is known to be the only portion of the Putty package that can let you copy files to and from remote computers through the use of the SCP.

Secure Copy (SCP)  is simply defined as a computer command that one can use in Linux to copy files from one computer to another on a network.  PuTTY is simply known to be a free implementation of SSH (and telnet) used for computer that running Microsoft Windows.

Learn more about the PuTTY package from

brainly.com/question/13171394

8 0
3 years ago
Based on the following passage on construction technology during the Middle Ages, why might a worker not be allowed to join a gu
olya-2409 [2.1K]

Answer:

He was not born into a family of skilled laborers

Explanation:

6 0
3 years ago
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attack
Strike441 [17]

Answer:

Intrusion Prevention System (IPS)

Explanation:

Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer

Thus, the tool you should use is an intrusion prevention system (IPS).

6 0
3 years ago
Given five positive integers, find the minimum and maximum values that can be calculated by summing exactly four of the five int
Aloiza [94]

Using the knowledge in computational language in JAVA it is possible to write a code that  print the respective minimum and maximum values as a single line

<h3>Writting the code in JAVA:</h3>

<em>import java.io.*;</em>

<em>import java.util.*;</em>

<em>import java.text.*;</em>

<em>import java.math.*;</em>

<em>import java.util.regex.*;</em>

<em />

<em>public class Solution {</em>

<em>    public static void main(String[] args) {</em>

<em>        Scanner in = new Scanner(System.in);</em>

<em>        long sum = 0;</em>

<em>        long max = Long.MIN_VALUE;</em>

<em>        long min = Long.MAX_VALUE;</em>

<em>        for (int i = 0; i < 5; i++){</em>

<em>            long n = in.nextLong();</em>

<em>            sum += n;</em>

<em>            max = Math.max(max, n);</em>

<em>            min = Math.min(min, n);</em>

<em>        }</em>

<em>        System.out.println((sum - max) + " " + (sum - min));</em>

<em>    }</em>

<em>}</em>

See more about JAVA at brainly.com/question/12974523

#SPJ1

8 0
2 years ago
Redesign the cover of science textbook using at least two different graphics​
Tanya [424]

Answer:

what design do you want, also what design am i redesigning.

8 0
3 years ago
Other questions:
  • Specification of database requirements falls under which category of database​ administration?
    8·1 answer
  • in c++, what happends when i add 1 to the RAND_MAX then take rand() deivded by (RAND_MAX+1)?if my purpose is to take out a rando
    11·1 answer
  • The ____ layer of the osi model performs a series of miscellaneous functions necessary for presenting the data package properly
    6·1 answer
  • When working on word processor document,the del key does what
    12·2 answers
  • The number of bytes in an array is always a multiple of the number of ____ in an array.
    6·1 answer
  • What will the following segment of code output? Assume the user enters a grade of 90 from the keyboard. cout &lt;&lt; "Enter a t
    5·1 answer
  • Why might you choose a Macintosh operating system rather than a Linux operating system?
    5·2 answers
  • Create an algorithm that will convert dog years to human years using the assumption that 1 dog year = 7 human years. Prompt the
    8·1 answer
  • How is “compromise" defined in the context of information technology and Select one answer.
    5·2 answers
  • Silicone rubber and urethane caulks generally give the ____________ overall performance for exterior building envelope applicati
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!