1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Law Incorporation [45]
3 years ago
13

Name all the keys of the home row.

Computers and Technology
1 answer:
Kaylis [27]3 years ago
5 0

Answer:

Search key, a, s, d, f, g, h, j, k, l, : and ;, ¨ and ´, and the enter key.

You might be interested in
EASY AND I GIVE BRAINLIEST!!! What is a good jeopardy question about operating systems?
madam [21]

 ______ is used in operating system to separate mechanism from policy
<span><span>A. Single level implementation</span><span>B. Two level implementation</span><span>C. Multi level implementation</span><span>D. None</span></span>
3 0
2 years ago
Finally, Su uses the last slide of her presentation as a summary slide. She wants to make sure the text she types automatically
Alex777 [14]

Answer:

Format Shape pane

Text Options

Shrink text on overflow

Explanation:

6 0
3 years ago
Read 2 more answers
On a router configured to use RIP, the number of routers a packet must travel between before it reaches its destination is calle
11111nata11111 [884]

Answer:

metric

hop count

Explanation:

6 0
3 years ago
Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?
Nat2105 [25]

Answer:

The certification developed by the SANS is GIAC certification .In this there are 3 certification GSEC,GISF and GCED .The description of these certification is given below .

Explanation:

The GIAC certification course is providing the knowledge of the security like cryptography ,networkig knowledge etc .

GSEC:The GSEC Certification is the certification of the security.It simply means this certification certified about the security risk in the computer system .

GISF: This certification gives the knowledge of the networking as well as the security in the computer system also it gives the knowledge of the cryptography.

GCED :This certification is also providing the knowledge of security as well as networking.

Difference between GIAC and  InfoSec certifications is given below

  • The SANS certification is giving the knowledge about the security risk as well as cryptography by the professional where as the InfoSec certifications providing the knowledge of the hacking by the professional .
  • The SANS is including the certification of  GIAC certification where as the InfoSec certifications is including the  CISSP and SSCP certification .
4 0
3 years ago
A device has an IP address of 10.1.10.186 and a subnet mask of 255.255.255.0. What is true about the network on which this devic
lawyer [7]

Answer:

Only the last number of each IP address will be unique

Explanation:

Subnet Mask is used to identify the two parts of the IP address. One is the network part that should be same for one network, and other is host part that will vary with number of computer or devices that are connected to the network.

Subnet mask is 32 bit address that are divided in 4 equal parts of 8 bits. Each 8 bit converted to decimal by varying different bits to generate 256 different decimal number combinations. It means we can vary the address range between 0 to 255. So If any 8 bit portion is 255 that means, in this section we cannot add host address.

<u>For Example</u>

In given case,

Subnet Mask = 255.255.255.0

That means first three portions are fixed and has been allocated for network part.  

The forth portion is 0 that means we can change this portion in IP address up to 255 different addresses.

So the IP address that is given can be vary as:

10.1.10. 186

10.1.10 This portion is network portion, this cannot be vary.

only the number 186 is the unique address that is particularly assigned to the devices and is vary between 0 to 255.

8 0
3 years ago
Other questions:
  • The ability for a protocol or program to determine that something went wrong is known as_________.
    15·1 answer
  • Earthquakes happen in the Earth’s
    10·1 answer
  • Write pseudocode instructions to carry out each of the following computational operations:1. Determine the area of a triangle gi
    12·1 answer
  • Which question about whale sharks is nonscientific?
    11·2 answers
  • A group of computers that are interconnected in order to share information or documents is called what?
    13·1 answer
  • In a systems development life cycle (SDLC) model, the purpose of the _____ is to create a physical model that will satisfy all d
    10·1 answer
  • The overall cost of wiring in addressable fire alarm system is significantly cheaper than the conventional one. Why is it so?
    14·1 answer
  • Why did Elena Gilbert Turn her humanity off when she was sired to Damon? (In The Vampire Diaries)
    14·1 answer
  • Constructive criticism is intended as a possible solution.
    13·1 answer
  • To delete unnecessary files on a hard disk use software
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!