1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
7

What is the mass of a cookbook

Computers and Technology
1 answer:
tatiyna3 years ago
6 0

Answer:

it varies on the size of the cookbook

Explanation:

You might be interested in
Two people, Alice and Bob are using the key sharing algorithm. They have chosen a clock size of 17 and a base of 5. Alice's priv
hjlf

Answer:

fsfsf

Explanation:

6 0
3 years ago
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci
Slav-nsk [51]
The containment strategy prevents intruders from removing information assets from the network, and prevents attackers from using the organization's network as a launch point for subsequent attacks.
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with <span>blocking a specific IP address. Correct answer: C

</span>

8 0
3 years ago
_ ports are audiovisual ports typically used to connect large monitors. These ports are used with many Apple Macintosh computers
cestrela7 [59]

Thunderbolt ports are audiovisual ports typically used to connect large monitors.

<h3>What is a Thunderbolt port?</h3>

A Thunderbolt is known to be used in systems by users. It is one that helps its users to be able to use one cable to have an access to a high-speed and high-resolution media.

This is often done by using one port along with a cable that is able to access both DisplayPort and PCI Express. Thunderbolt is known to contain technology that has been built into it that helps PCI Express speed to come in a good and better way.

Learn more about ports  from

brainly.com/question/10097616

4 0
2 years ago
A(n) __________ consists of nonproprietary hardware and software based on publicly known standards that allows third parties to
Rus_ich [418]

Answer:

The answer is "Open System".

Explanation:

The term open system means a computing system, that integrated across software and hardware devices and provides complies with the same accessibility requirement.  

  • This connectivity and functionality mean, that a machine operating the Windows OS could be regarded as an open platform as can be seen by Windows being such a software OS.
  • It is composed of the non-owned development tool, which is based on publicly reported values, that enable service providers to generate attach-on to the system.
6 0
3 years ago
Technician A says that you should always compare the new hub to the old one to make sure the new hub is correct for the applicat
german
Technician B because if you always compare to previous hubs then you’ll never progress and the same mistakes will keep reoccurring.
3 0
4 years ago
Other questions:
  • Which language do you use to add functionality to a web page
    8·1 answer
  • What is one thing the ADDIE model does NOT account for?
    14·1 answer
  • An organization’s SOC analyst, through examination of the company’s SIEM, discovers what she believes is Chinese-state sponsored
    12·1 answer
  • A healthcare organization received notification that a hospital employee’s laptop that contained PHI was inadvertently left at a
    14·1 answer
  • A command, such as a button or keyboard shortcut, that performs a specific task is known as a
    9·2 answers
  • Programs which were typically reserved for college-level classes such as computer animation and CAD programs are now being appli
    13·1 answer
  • In video game development, the person who oversees and directs the entire design team and is the key vision keeper is
    13·1 answer
  • . List down mental health problems that may arises with excessive use of digital social networking Do we ever need to be concern
    12·1 answer
  • Besides entering a URL to go directly to a website, what else can you enter in a browser address bar to explore the internet?
    9·1 answer
  • Select the correct answer.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!