1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nalin [4]
3 years ago
12

Combine like terms to create an eqivalent expresion. -1/2(-3y+10)​

Computers and Technology
1 answer:
harkovskaia [24]3 years ago
4 0

Answer: Google doesn't have the answer.

Explanation:

I tried

You might be interested in
The two fundamental approaches to moving data through a network of links and switches are
olga55 [171]

Answer:Packet and circuit switching

Explanation: Packet switching is the technique through which the data is sent from the source to destination in the form of data packets on dynamic path.It is the time of connectionless switching and route generates for each packet.

Circuit switching is the switching technique having connected path for the sending and receiving of the data.They have well defined and established path for the transmission of data.

Other options are incorrect because they define the terms that are associated with the data that gets transmitted like bandwidth,transmission rate ,packet etc. These options are not the way in which data transmitted or switched.Thus, the correct option is packet and circuit switching.

6 0
3 years ago
Can someone please help me with this
inessss [21]

the first question answer is true

the second question answer is true

please brainliest me i just took the test so i know those 2 answers are correct!

3 0
3 years ago
A third party intercepting a packet and downloading its information before it is sent onward toward its destination is called
SSSSS [86.1K]

Answer:

Explanation:

<u>Packet sniffing</u> is the process of capturing each packet that is transmitted over the network and analyzing its content. Most of the time, packet sniffing is used to troubleshoot network problems or to gather network statistics. The software or device used for capturing packet data is called packet sniffer, packet analyzer, network sniffer or simply network analyzer.

The Packet Sniffer Sensor monitors, among other things:

• Total traffic

• Port sniffer

• Web traffic (HTTP, HTTPS)

• Mail traffic (IMAP, POP3, SMTP)

• File transfer traffic (FTP, P2P)

• Infrastructure traffic (DHCP, DNS, ICMP, SNMP)

• Remote control (RDP, SSH, VNC)

• Other UDP and TCP traffic

Third party intercepting a packet and downloading it information before it is sent onward toward its destination is called <u>Packet Sniffer</u>

4 0
3 years ago
If you were an online community director, you might use both chat and e-mail in your community. What are some similarities and d
stealth61 [152]

Emails are formal

Online chats are private and friendly

Emails are used for business

Online chats are for friends

5 0
3 years ago
Which tab will you use to format data in cells?
melamori03 [73]

Answer:

Right Click and select Format Cells (CTRL + 1)

Explanation:

To format cells in Excel, you select the cell(s) you want to format, right click, and in the dialogue box that appears select 'Format Cells'.

6 0
3 years ago
Other questions:
  • Using caller id is part of which step in an effective time management plan
    10·1 answer
  • Write a short program that uses a for loop to populate an array. The array can store up to 10 integers. Modify the code slightly
    12·1 answer
  • Which of these file formats would you choose if you had to create a very small and compact raster image for a website?
    11·1 answer
  • In which type of modulation is a 1 distinguished from a 0 by shifting the direction in whichthe wave begins?
    14·1 answer
  • RFID tagging is an IoT technology that allows assets to be tracked using electromagnetic fields to automatically identify tagged
    10·1 answer
  • Which format of image files can be inserted in html?​
    8·2 answers
  • Can someone plz explain me what this button does and I’m scared to click it
    11·1 answer
  • What is a network computer that processes requests from a client server​
    11·1 answer
  • Software that uses signature-based detection contains a library of signatures of known _____?
    11·2 answers
  • This the code from the last post I did
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!