1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
10

A sequence of direct connections

Computers and Technology
1 answer:
stealth61 [152]3 years ago
5 0

Explanation:

Es tut mir nicht so leid

You might be interested in
Mary is employed by a multinational firm, and works lon hours on a desktop computer. Recently, she experienced back pain and vis
iVinArrow [24]
Sit with good posture, get up and stretch and walk for 1 minute every 45 minutes.
6 0
3 years ago
Read 2 more answers
modern managed cloud service providers will often use secure keyboard/video/mouse (kvm) devices within their data centers. these
professor190 [17]

A cloud service providers uses KVM in their data centers because they are gravely concerned with insider threats.

KVM is a system for management, monitoring and control of a data center environment from a central location. In the data center this system is very necessary because the data center has multiple servers and computers. With this system the server can be connected and controlled from a remote location. This includes mapping the physical locations of accessible virtual drives.

Your question is incomplete, but most probably you full question was:

Modern managed cloud service providers will often use secure Keyboard/Video/Mouse (KVM) devices within their data centers. these devices are extremely expensive compared to their non-secured counterparts. which of the following is one of the reasons cloud service providers do this?

  • They have plenty of revenue and can afford it
  • They are gravely concerned with insider threats
  • Cloud data centers need very few of these devices
  • Managed cloud providers often manufacture their own devices as well

Learn more about servers brainly.com/question/27960093

#SPJ4

7 0
1 year ago
Good morning beautiful people,
Nataliya [291]

Answer:

The girl that fed the dying boy?/

Explanation:

4 0
3 years ago
If x has a value of 7 and y has a value of 20, what is displayed as a result of executing the code segment
Llana [10]

<em>6.65 </em><em>is displayed as the</em><em> output </em><em>of the </em><em>block of code</em>

<em />

In python programming, * denotes multiplication. To get the output, we will substitute the value of x and y given into the result to have;

<em> result = x * y - x / (y)</em>

<em> result = 7 * 20 - 7 / (20)</em>

<em> result = 140 - 7 / (20)</em>

<em> result = 133/20</em>

<em> result = 6.65</em>

<em />

<em>This shows that </em><em>6.65 </em><em>is displayed as the</em><em> output </em><em>of the </em><em>block of code</em>

<em />

The question is incomplete;

Let the code segment be

<em>>>> x = 7 </em>

<em>>>> y = 20   </em>

<em>>>> result = x * y - x / (y) </em>

<em>>>> result  </em>

<em>output:__?</em>

<em />

Learn more here: brainly.com/question/24240957

5 0
3 years ago
Suppose 8 people want to communicate with each other using public key encryption. The communication between any pair of them is
ludmilkaskok [199]

Answer:

The answer is "64"

Explanation:

There has been 1 Private Key 1 Public Key for every person. The private key is used for other app messages. All else uses the Public Key to encrypt messages with that user. Those keys are numerically related. Even if you have 5 users, you will be given 5 Personal keys and 5 Public keys.

  • All user will have a duplicate of other public keys, which indicates (n*n-1) copies of n public keys on different systems to make sure shared contact between all users, plus n private keys.
  • The unique key count is 2n, with n^2 distributed private and public keys on different systems.
  • 8 people,  where 8 is a number, that is equal to n so, n^2 = 8^2 =8 \times 8 = 64
5 0
3 years ago
Other questions:
  • In the lab, you performed an asset identification and classification exercise by creating a(n) __________ organized within the s
    10·1 answer
  • What are the advantages and disadvantages of using thermoset plastics
    14·1 answer
  • Write a function named enterNewPassword. This function takes no parameters. It prompts the user to enter a password until the en
    14·1 answer
  • In most signal "timing diagrams" (like the one below) the signals do not change from low to high, or from high to low, abruptly.
    5·1 answer
  • Match the function to its purpose.
    8·1 answer
  • The web server administrator at your e-commerce company is concerned about someone using netcat to connect to the company web se
    11·1 answer
  • How was WiFi discovered?
    8·1 answer
  • How do we Rewrite the following Python code to avoid error. mark=inpt("enter your mark ")
    6·1 answer
  • Higher Order Functions used for simulations of dice rolls. Definition: An n-sided dice function takes no arguments and always re
    12·1 answer
  • You are given the following design parameters, fill in the table: All memory addresses are 32-bit long; A 64Kbyte (2^16 byte) ca
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!