1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phoenix [80]
3 years ago
8

Use the following scale to rate yourself: (There is no wrong answer

Computers and Technology
1 answer:
Law Incorporation [45]3 years ago
8 0
Doesnt have any picture
You might be interested in
Why is it unlikely that you will find the ip address 192.168.250.10 on the internet?
gayaneshka [121]
That IP address is either Internal, private or reserved
5 0
3 years ago
I paid $23.99 to subscribe for the “no adds” version.. its now been a week since then but today I’m shown adds and advertisement
Aliun [14]

contact the staffs or  it's a weekly paid item

8 0
3 years ago
What are different social phenomenas are you aware of that used part of a social movement, change, or cause
marin [14]

Answer:

Social change in the broadest sense is any change in social relations. Viewed this way, social change is an ever-present phenomenon in any society.

Explanation:

7 0
2 years ago
When initiating a connection how does tcp establish a connection?
Pani-rosa [81]
It uses a 3-way handshake

1. SYN from client to server.
2. SYN-ACK from server to client.
3. ACK from client to the server.

At this point, both client and server have received an acknowledgement of the connection.

4 0
3 years ago
Fungi, plants, algae, mold, and humans are all located in the
Strike441 [17]

they are all eukaryotic cells

5 0
4 years ago
Read 2 more answers
Other questions:
  • Modern operating systems decouple a process address space from the machine’s physical memory. List two advantages of this design
    15·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    9·1 answer
  • Most smartphones use operating systems developed by ________.
    10·1 answer
  • I have a DBA for keyboarding coming up and I am nervous. Any tips or pointers?
    10·2 answers
  • The term _______ is used to refer to programs that attackers install after gaining unauthorized access to a system, ensuring tha
    15·1 answer
  • What is the output of the code below assuming that global variable x has value 2 and global y has value 3? def f1(): return "ab"
    13·1 answer
  • Port 25 is currently closed on your firewall. what does this mean? <br> a.
    6·2 answers
  • A function ________ contains the statements that make up the function.
    5·1 answer
  • Look at the slide.
    10·2 answers
  • A web based application that integrates html code with business logic is said to be in violation of what design principle?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!