1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
3 years ago
7

HI How are you anyways are any of you intreseted in my giveaway

Computers and Technology
2 answers:
Zanzabum3 years ago
8 0

Answer:

Yes I am thanks for the points

have a good day :)

Explanation:

goldfiish [28.3K]3 years ago
6 0
Dang dang dignity dang a dang dang dang dignity dang a dang
You might be interested in
W-11/6=4<br><img src="https://tex.z-dn.net/?f=%20%20%5Cfrac%7Bx%20-%2011%20%7D%7B%206%7D%20%20%3D%204" id="TexFormula1" title="
kozerog [31]

step 1, multiply by 6:

x-11 = 4*6 = 24

step 2, add 11:

x = 35

7 0
3 years ago
Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
wariber [46]
The correct answer is letter B. Application Software. Word Processing software, spreadsheet software, database software, and presentation software are examples of Application software. These are applications that are mostly output based.
8 0
3 years ago
An administrator needs to set up an authentication server for users connecting to a network through a VPN. What kind of server c
nalin [4]

Answer:

RADIUS

Explanation:

RADIUS is the networking protocol that is used for the purpose of authentication to access the network resources. The full form of RADIUS is Remote Authentication Dial In User Service. It is used by different organizations, which setup their own network that can be accessible through VPN, DSL or modems through different networks. The purpose of this protocol is to establish the security and authentication mechanism by organization itself.

So, If an administrator needs to set up an authentication server for users connecting to a network through a VPN, he should establsih the RADIUS based Server.

3 0
4 years ago
Controller Area Network CAN B bus diagnostics is being discussed. Technician A says some modules do not set specific codes that
miss Akunina [59]

Answer:

Both Technician A and Technician B is correct.  

Explanation:

CAN (Controller Area Network) is specially designed for the European cars and the automotive industry, but it has become the popular bus in the industrial automation and also in other applications.  

CAN is the serial communication bus that is designed for flexible and robust performance in a harsh environment.

3 0
4 years ago
You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicle
kati45 [8]

There are different ways to ensure safety of devices. The best protection to implement to address your concerns is to use cable locks to chain the laptops to the desks.

  • The use of laptop locks is as good as when compared to bicycle chain locks. One can do this by looking for a big, immovable object, such as one's desk, and thereafter you wrap the metal cable around it and then insert the lock into your laptop's lock slot.

With this, your computer becomes theft-proof.

Thia will give you piece of mind as you will not be restless anymore.

Learn more about Laptop security from

brainly.com/question/24956493

3 0
3 years ago
Other questions:
  • 2- There are many different design parameters that are important to a cache’s overall performance. Below are listed parameters f
    11·1 answer
  • toThePowerOf is a method that accepts two int arguments and returns the value of the first parameter raised to the power of the
    6·1 answer
  • What is looping in QBASIC​
    9·1 answer
  • Each of the walls of a room with square dimensions has been built with two pieces of sheetrock, a smaller one and a larger one.
    11·1 answer
  • How do you determine which type of operating system that best supports your computer or mobile device?
    5·1 answer
  • I need help with yes lol please and thank you
    15·2 answers
  • Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security
    8·1 answer
  • PLS HELP ME!! WILL GIVE BRAINLIEST
    7·2 answers
  • What are some ways you can give staying off your phone a "boost" and make it easier to do?
    9·1 answer
  • Most cell phones and tablets have solid-state storage drives. internal hard disk drives. internal cloud storage. external hard d
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!