1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
3 years ago
15

1.A tachometer measures:

Computers and Technology
1 answer:
Art [367]3 years ago
3 0
1. D


2. D


I hope I helped :)
You might be interested in
___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
natta225 [31]

Answer:

Layered security

Explanation:

Layered security is a multiple layers defense practice used to protect resources and data. One goal of the layered security is to create redundancies or also known as backups to face the situation that one or more of the security measures in the outer layer fail or are bypassed, at least the resources and data still get protected by inner layer security. The number of security layer set for the resources is dependent on how important the resources are.

3 0
3 years ago
A(n) _____________ is a system that prevents a specific type of information from moving between untrusted networks and private n
VashaNatasha [74]

Answer:

Firewall is the correct answer for the above question.

Explanation:

  • A firewall is used to block unwanted sites for any users of the network. It can be software or hardware or both. It is also called a system because it can be a mixture of the software and the hardware.
  • It is used to block unwanted sites. When any user does not want to access any sites from the computer system, then he blocks the sites with the help of this.
  • The above question asked about the system which is used to block unwanted information. This system is known as a firewall. Hence the answer is FIrewall.
7 0
3 years ago
Making the data impossible to recover even by applying physical forensics methods is known as __________ of media.
madam [21]

Answer:

Anti-Forensic Techniques.

Explanation:

Anti-Forensic Techniques are thsoe techniques used to deviate the Forensic tools by injecting fake informations, hiding information, planting bugs, editing or erasing information, rendering it impossible to recover the data. It is a criminal way of hacking approach that restrains Forensics to find the hackers.

Anti-Forensic tools and techniques works in oppose to the Forensic tools and techniques that tries to recover the data, locate the hacker.

Thus the correct answer is anti-forensic techniques.

3 0
3 years ago
If you have 60fps on your laptop tell me one way you can go to 240fps
choli [55]

Answer: NO

Explanation:

A 60hz monitor refreshes the screen 60 times per second. Therefore, a 60hz monitor is only capable of outputting 60fps

4 0
3 years ago
Read 2 more answers
_____ lets you look at two documents at the same time.
jasenka [17]
B. Side by side view
6 0
2 years ago
Other questions:
  • Identify at least three body language messages that project a positive attitude?
    15·1 answer
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    13·1 answer
  • (Financial application: compound value) Suppose you save $100 each month into a savings account with the annual interest rate 5%
    8·1 answer
  • A text file has been transferred from a Windows system to a Unix system, leaving it with the wrong line termination. This mistak
    15·1 answer
  • Edhesive 3.2 Lesson Practice question 1
    5·1 answer
  • Is it important for a writer to include voice and point of view in writing because...<br> Plz help
    10·1 answer
  • When using file explorer, the right-hand pane that shows the files and folders of the selected area is called the pane?
    7·1 answer
  • Here is the problem specification: An Internet service provider has three different subscription packages for its customers: Pac
    5·1 answer
  • Does anyone know what i did wrong?
    13·1 answer
  • This is a human-made physical system.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!