1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lostsunrise [7]
2 years ago
14

______are our thoughts and feelings towards a particular subject

Computers and Technology
1 answer:
ddd [48]2 years ago
8 0
c....attitudes.....
You might be interested in
Jasmine took many pictures at a photo shoot. She wants to transfer these pictures from her camera to her laptop for image enhanc
hoa [83]
The answer would more likely be A
If it’s not correct I’m very sorry
5 0
2 years ago
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as for exam
Dvinal [7]

Answer:

Option B: DNS

Explanation:

Domain Name Server (DNS) is analogous to a phone book where people can look up a person name through numerical phone number. A DNS server is a database that host a database of public IP addresses (e.g. 64.233.160.0) and their associated hostname (e.g. google.com).

Whenever we type domain name in the address bar of our browser (e.g. google.com), that domain will be delivered to DNS server. Inside DNS server the URL will be mapped with its corresponding IP address making it possible for the web request to reach the the target server.

6 0
3 years ago
What is meant by key distribution center ( KDC)?
erastovalidia [21]

Answer: A. A method of access control that allows a user to log on to a system and gain access to other resources within the network via the initial logon

Explanation: key distribution center ( KDC) is a system that is used to provide access to a particular network user who shares data which are either private or regarded as sensitive.

It is a form of encryption that allows multiple system within the same network through the use of uniquely secured tickets used to setup a secure connection which gives room for data to be shared.

KDC makes use of cryptographic techniques to prove the validity of a user and grants a ticket permission access. The user present the ticket of permission to the system which then validates it and grant access to the user.

Example of security system that adopts KDC include kerberos.

4 0
3 years ago
When you ask the database more complex questions using comparison operators, you are conducting a _____?
yulyashka [42]
<span>When you ask the database more complex questions using comparison operators, you are conducting a query.
</span><span>The term "query" denotes  a programmatic statement that is understand by a the DBMS(Database management system) that understands how to access and manipulate data within a database. </span>
7 0
3 years ago
Read 2 more answers
A programming language that captures only the most primitive operations available to a machine. Anything that a computer can do
Anton [14]

Answer:

A. True.

Explanation:

Programming languages are computer based languages used to pass instructions or task that can be interpreted to machine language, which can be understood by the computer system. Low level programming language and high level programming language are the two categories of program languages.

Low level languages use low level commands. They use processor instruction sets and primitive opcodes for their instruction syntax. Example of a low level language is Assembly language.

High level languages are English based and more complex in its compilation.

8 0
3 years ago
Other questions:
  • Liz will use a CD-R compact disk to write to more than once. Carlo will use a CD-RW compact disk to write to more than once. Who
    8·2 answers
  • If it is impractical to place guest users in a secure network, isolated from the production network by firewall barriers, then:
    14·1 answer
  • The Beaufort Wind Scale is used to characterize the strength of winds. The scale uses integer values and goes from a force of 0,
    11·1 answer
  • An
    9·1 answer
  • Your dad just gave you his old computer running Windows 7. You want to see how many volumes are contained within it. Which tool
    10·1 answer
  • Please help
    11·1 answer
  • The foundation of secure communication on the internet replies on asymmetric encryption, with the use of Public and Private keys
    10·1 answer
  • (b) In Scratch, the instruction 'when I receive' enables us to _____ the action of multiple sprites ​
    5·1 answer
  • How will technology help people with disabilities become more transportation independent?.
    5·1 answer
  • 9.2 lesson practice ​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!