1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexgriva [62]
2 years ago
12

75+ (43-54) -12 12 41

Computers and Technology
2 answers:
rosijanka [135]2 years ago
5 0
I didn’t get any of those i got 64
Zinaida [17]2 years ago
4 0

Answer:

the answer isnt any of them i got 64 for 75+(43-54)

Explanation:

You might be interested in
. Which of the following are container elements?
lions [1.4K]
It’s c cba to explain
4 0
2 years ago
Read 2 more answers
Streaming media known as _____ is stored on the provider's server, which allows you to play the media multiple times. To watch v
const2013 [10]

Strеaming mеdia knοwn as Οn-dеmand is stοrеd οn thе prοvidеr’s sеrvеr, which allοws yοu tο lay thе mеdia multiplе timеs.

Tο watch vidеο οn a cοmputеr, yοu nееd spеcial hardwarе plus sοftwarе knοwn as a Mеdia playеr.

Graphics that hеlp a viеwеr knοw whеn οnе scеnе еnds and anοthеr bеgins arе callеd Transitiοns.  

Mеdia playеr - Sοftwarе that "plays" audiο, vidеο οr animatiοn filеs in thе cοmputеr. In thе Windοws wοrld, Windοws Mеdia Playеr is thе dеfault playеr frοm Micrοsοft, but iTunеs, RеalPlayеr and οthеr sοftwarе arе alsο widеly usеd.

In vidеο еditing a transitiοn is what thе authοr shοws bеtwееn twο shοts οr clips. Thе jοining οf thοsе clips is thе transitiοn frοm οnе tο thе οthеr. Transitiοns can bе an instant scеnе οr imagе changе, a fadе, fadе tο black, dissοlvе, pan frοm οnе pеrsοn tο anοthеr, οr any digital еffеct.

4 0
3 years ago
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward t
stepladder [879]

Answer:

Repeaters

Explanation:

As the question points out, the signal strength diminishes (attenuates) as it travels farther from the source.  Deploying a repeater at critical points throughout the building would boost the signal strength as it continues on its way.

5 0
2 years ago
Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance to gather extensive informat
LUCKY_DIMON [66]

The  reasonable steps should the company have taken to prevent Jane from finding this information is to do a Vulnerability scanning or a A penetration test.

  • How To defend Against Port Scanning try and use or Install a Firewall and the use of TCP Wrappers.

<h3>What is  Vulnerability scanning?</h3>

This is a kind of passive reconnaissance techniques. This form of scanning is the process of auditing a said network. A vulnerability scanner is one that looks into the network or application to see issues but they do not attempt to exploit any vulnerabilities that is seen.

A penetration test (pen test) is known to be a form of ethical hacking that entails one to think like an attacker and find out ways to penetrate the target's security systems. This aim to:

  • Verify a threat exists.
  • Bypass security controls.
  • Actively test security controls.
  • Exploit vulnerabilities.

Learn more about penetration test  from

brainly.com/question/26555003

8 0
2 years ago
Discuss the advantages and disadvantages of using a USB or parallel port dongle for licensing purposes.
Dafna11 [192]

An advantage is portability A disavantage is loseability An advantage is faster read and write speeds(most of the time) a disavantge is less storage

4 0
3 years ago
Read 2 more answers
Other questions:
  • I don't know the answer and I tried different ones and they not what the book is looking for.
    7·1 answer
  • Geobubble Chart (2D) displaying Robot Density Per 10,000 Employees for the specified countries;
    7·1 answer
  • What tasks do most operating systems perform?
    15·1 answer
  • A group of interrelated resources acting together according to a plan to accomplish the goals of the records and information man
    5·1 answer
  • On a client/server network, data does not necessarily follow the same path between the request (client) and the response (server
    6·1 answer
  • Write a program that takes a point (x,y) from theuser and find where does the point lies. The pointcan
    8·1 answer
  • Please help ASAP!
    5·1 answer
  • What are some other ways to program a robot to navigate a complicated environment other than straight paths and right angle (90
    8·2 answers
  • What makes a source credible?
    9·2 answers
  • Which tab do you open to access the Comments feature?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!