1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
12

Technician A says that the last step in the diagnostic process is to verify the problem. Technician B says that the second step

is to perform a thorough visual inspection. Who is correct?
A. Technician A
B. Both Technicians A and B
C. Neither Technician A nor B
D. Technician B
Computers and Technology
1 answer:
andreev551 [17]3 years ago
3 0

the answer is A you're welcome

You might be interested in
A(n) ____ is an attack that takes advantage of a system vulnerability.
jarptica [38.1K]
<span>Exploit -</span> An attack that takes advantage of a system vulnerability, often<span> due to a combination of one or more improperly configured services.</span>
8 0
3 years ago
In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block bp
Sergio039 [100]

In order to prevent ports that are serving network hosts from being considered as best paths, BPDU guard should be enabled to block bpdus.

<h3>What are BPDU used for?</h3>

A bridge protocol data unit (BPDU) is known to be a kind of a data message that is known to be often  transmitted in a local area network to be able to know or find loops in that given network topologies.

Hence, in the case above, In order to prevent ports that are serving network hosts from being considered as best paths, BPDU guard should be enabled to block bpdus.

See full question below

. In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?

a. BPDU filter

b. BPDU guard

c. root guard

d. BPDU drop

Learn more about ports from

brainly.com/question/10097616

#SPJ1

6 0
2 years ago
When you _____ a workbook, you control the ability users have to make changes to the file?
ehidna [41]
<span>When you protect a workbook, you control the ability users have, to make changes to the file.  This is t</span><span>o prevent other users from making changes, functions like adding, moving, deleting, or hiding worksheets, and renaming worksheets, you can </span>protect<span> it </span><span>with a password. </span>
5 0
3 years ago
Orphan record example?
Goryan [66]

Answer:

If we delete record number 15 in a primary table, but there's still a related table with the value of 15, we end up with an orphaned record. Here, the related table contains a foreign key value that doesn't exist in the primary key field of the primary table. This has resulted in an “orphaned record”.

4 0
3 years ago
Just admit it. You have more than one account on brainly. If not several you have one where you have a bad reputation and anothe
Paha777 [63]

Answer:

No I don't this is my only account ;-;

Explanation:

But I have considered making a new one but for now this is my only account lolll although it does seem to make good sense when it comes to having a bad reputation on the other account. why haven't I thought about that- see how slow I am dang g , I am dummer that I thought I was..Imaoo

3 0
3 years ago
Read 2 more answers
Other questions:
  • What's the fastest way to reset Android pin?​
    5·1 answer
  • A geologist is part of what career feild
    6·1 answer
  • Write a program that displays the following pattern: ..\.\* .\.\*** \.\***** ******* \.\***** .\.\*** ..\.\* That is, seven line
    8·1 answer
  • ______ is the software that blocks a user from being able to access your computer.
    9·1 answer
  • ______ is using material created by others without obtaining permission from the original authors.
    10·2 answers
  • Which type of software is the most similar to database software?\
    5·1 answer
  • One horsepower is equal to how many foot-pounds of work per second?
    10·2 answers
  • Write a algorithm to attend birthday party​
    8·2 answers
  • Write a program that lets a maker of chips and salsa keep track of sales for five different types of salsa: mild, medium, sweet,
    14·1 answer
  • For each of the descriptions below, perform the following tasks:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!