1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesnalui [34]
3 years ago
14

My feelings alwayss T-T

Computers and Technology
2 answers:
ddd [48]3 years ago
8 0

Answer:

my feelings always :/

Explanation:

Montano1993 [528]3 years ago
3 0
It’s ight brodie:)))
You might be interested in
Users report that the network access is slow. After questioning the employees, the network administrator learned that one employ
lisabon 2012 [21]

Keeping the fact in mind that network access has been found to be slow and after questioning the employees, the network administrator learns that an employee downloaded a third-party application which turns out to be a scanning program for the printer.

<u>Explanation:</u>

The employee must have been unaware of the fact that the application was accompanied by a worm or a computer worm.

A computer worm is a type of malware that has a property to replicate itself and after infecting a particular computer increases its range and gets in the other computers working on the same network which is the main reason for reduced processing speed.

3 0
3 years ago
Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output i
Nitella [24]

Answer:

Testing

Explanation:

From the question, we understand that Carlos just finished the coding of the app.

In software development life cycle, the coding phase is where Carlos is expected to make use of his choice of programming language to design the app;

This stage is an integral part of the implementation process and according to the question, the coding has been completed;

The next phase or stage after the implementation phase is testing.

Hence, Carlos is getting ready to test the app.

4 0
3 years ago
Read 2 more answers
nside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in th
Rina8888 [55]

Complete Question:

Let's say that you handle the IT systems administration for your company. There's a server inside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in three months, the server won't allow the client machine to access its resources anymore. What can you set to make sure that your client machines and the server times are in sync?

Answer:

Network Time Protocol (NTP).

Explanation:

As the IT systems administrator, you can set the network time protocol (NTP) to make sure that your client machines and the server times are in synchronization.

A network time protocol (NTP) can be defined as an internet standard protocol which is used by an IT system administrator to synchronize a computer's clock to a particular time reference over packet switched or local area network (LAN) and variable-latency data networks. NTP was developed at the University of Delaware by Professor David L. Mills.

<em>Basically, the network time protocol uses the coordinated universal time (UTC) and a client-server model to measure the total round-trip delay for a computer process. </em>

8 0
3 years ago
As more and more computing devices move into the home environment, there's a need for a centralized storage space, called a ____
Ksivusya [100]

Answer: Network attached storage device

Explanation:

Network attached storage(NAS) is the data storage server device that is responsible for serving files to configuration and other components.Through this sever device data can be retrieved by various client and user from central disk capacity .It provides good data access to diverse user and client of data.

  • Other options are incorrect because RAID drive, server station, gigabit NIC are not the devices that centrally store huge amount of data for access.
  • Thus, the correct option is network attached storage(NAS) device

8 0
3 years ago
A firewall, when properly implemented, can prevent most attacks on your system.
Verizon [17]
This is true, A firewall is used to get rid of viruses and attackers and keep them out of your computer. But if not properly implemented can do next to nothing for you.
5 0
4 years ago
Read 2 more answers
Other questions:
  • The company involved in an attack by Oleg Zezev from Kazahkstan, in which Zezev accessed computer data and copied personal infor
    12·1 answer
  • Which step of the machine cycle examines the op-code of the next instruction to be executed?
    12·2 answers
  • Which of the following inputs help robotic vacuum cleaners maneuver around obstacles?
    13·2 answers
  • SONET: is a standard for optical transmission that currently operates at Terabit per second speeds is almost identical to the IT
    7·1 answer
  • What does a shutter speed of one mean?
    14·2 answers
  • What are three recommendations for reducing risk and improving the privacy of your personal information while using social media
    13·1 answer
  • Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any n
    8·1 answer
  • A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troublesho
    8·1 answer
  • When was there a time that you feel you may have “failed” at something?
    13·2 answers
  • _______ are useful when you want the user to select one choice from several possible choices. Radio buttons Check boxes Buttons
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!