1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedbober [7]
2 years ago
9

____ is scientifically seeking and discovering facts.

Computers and Technology
1 answer:
galina1969 [7]2 years ago
3 0

Answer:

I believe it is science, but before you do anything with this answer, research more on it, just in case I'm wrong! :)

Explanation:

You might be interested in
The condition known as __________ occurs when you try to store an integer that is bigger than the maximum allowed by the number
Gnoma [55]

The condition known as <u>overflow</u> occurs when you try to store an integer that is bigger than the maximum allowed by the number of bits you have.

<h3>What is a buffer?</h3>

In Computer science, a buffer can be defined as a temporary area set aside on a computer system for the storage of data. This ultimately implies that, a buffer reside in the random access memory (RAM) of a computer system.

In the event that a computer system process or software program places more data (much more than what was originally intended to be allocated for data storage) in a buffer, the extra data overflows.

In this context, we can infer and logically deduce that when a value is assigned to an integer that is too big or large for the computer to represent, it is a condition referred to as an overflow.

Read more on overflow here: brainly.com/question/26143242

#SPJ1

4 0
1 year ago
For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used
qaws [65]

Answer:

These technologies are: Dual Stack Routers, Tunneling, and NAT Protocol Translation.

Explanation:

Dual Stack Routers -  This is the process in which a router’s interface is attached with IPv4 and IPv6 addresses

Tunneling -Tunneling is used as a medium to help the different IP versions  communicate with the transit network.

NAT Protocol Translation -  This helps the IPv4 and IPv6 networks communicate with each other since they do not understand the IP addresses of each other since, they are different IP versions.

3 0
2 years ago
Let's say that you handle the IT systems administration for your company. There's a server inside of your organization that chec
kirill115 [55]

From server do some file transfer to client PC to sync to the server.

<u>Explanation:</u>

As IT System administrator if PC or client or workstation or laptop not connected to network more than 3 months from windows server we need to refresh the connection and redo the connection from server to the client to do sync the activities.

Moreover from domain server refresh and re sync activities to establishing the connection.

Go to client PC or workstation or desktop login log and logout from the PC and login to domain account by changing the password.

7 0
2 years ago
A computer has three main modules that have individual reliabilities of 0.77, 0.94, and 0.81. Because of recent failures, manage
Artemon [7]
Yo también necesito ayuda con esto:(
6 0
3 years ago
While a threat intelligence analyst was researching an indicator of compromise on a search engine, the web proxy generated an al
inna [77]

Answer: the corret answer C. The analyst has prefetch enabled on the browser in use.

Explanation:

The analyst has like an indicator which is prefetch enabled on the browser in use.

7 0
2 years ago
Other questions:
  • The ______ identifies the path for the currently open folder
    8·2 answers
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
  • Web definition what means web
    9·1 answer
  • Which BI tool or technique would be most useful in predicting the likelihood of a fire in a building? a. Data mining b. Dashboar
    9·1 answer
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • How many bits are used to direct traffic to specific services running on a networked computer?
    6·1 answer
  • The way a student prepares for a test or reviews academic material is referred to as
    8·2 answers
  • Which of the following best describes a hotspot as
    10·1 answer
  • Copy the formula in cell M7 to the range M8:M15, and edit the copied formulas to return the value from the column indicated by t
    15·1 answer
  • Write a program to demonstrate circular linked list with operations using pointers – insert
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!