1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
3 years ago
8

Who has gotten a random file link from someone? What file does it contain?

Computers and Technology
2 answers:
Bad White [126]3 years ago
8 0

Answer:

those are bots , just report those

Explanation:

dalvyx [7]3 years ago
8 0
I got it but I didn’t download it cuz it looks sketchy he literally posted that same link to everyone who has made a question so I would advise not to download it
You might be interested in
In early PCs, a DIMM in any one of the DIMM slots could fill the 64-bit bus; therefore, each slot was called a(n) ______________
Svetach [21]

Answer:

The correct answer to the following question will be Option A (Bank).

Explanation:

  • Sometimes on a motherboard, the memory modules are grouped into different groups and that each group is named as a branch. Furthermore, the term "bank" may be used loosely to describe a basic computing data storage area. When the record is stored in the database it can be accessed at a specific time by the user.
  • Because the 486 is a 32-bit processor and a 30-pin SIMM is 8-bit, four SIMMs (8x4=32) is called a bank when installing memory on an 80486 processor computer; Install four 16 MB SIMMs when upgrading to 64 MB. 

Therefore, Option A is the right answer.

3 0
3 years ago
you are connected to a router. to provide access to the internet, you need to create a rule that would hide private ip addresses
kondor19780726 [428]

Based on the above, the technology that a person need to use is NAT.

<h3>What does Network Address Translation means?</h3>

The term Network Address Translation (NAT) is said to be the act or the process by which a person uses in mapping an internet protocol (IP) address to a given  place by altering the header of IP packets while in movement via a router.

Note that the Network Address Translation (NAT helps to boast as well as develop the security and lower the number of IP addresses an organization requires.

Hence, Based on the above, the technology that a person need to use is NAT.

Learn more about Network Address Translation from

brainly.com/question/24159022
#SPJ4

See full question below

You are connected to a router. To provide access to the internet, you need to create a rule that would hide private IP addresses behind one public IP address. Which technology should you use? (DHCP, Port forwarding, WPA, NAT)

8 0
2 years ago
Which is the last line of defense in a physical security sense?
Deffense [45]

Answer: (A) People

Explanation:

 The physical security system is the basically used in the information system. It is used in the technical and the administrator element in the security system. This is the technology oriented system that is basically used to prevent from the hacking attacks in the system.

So, the people is the last statement of the defense in the physical security as the various security system is basically used by various people.

4 0
3 years ago
What were precomputed tables and why were they necessary?​
Alex Ar [27]

Answer:

In algorithms, precomputation is the act of performing an initial computation before run time to generate a lookup table that can be used by an algorithm to avoid repeated computation each time it is executed.

7 0
3 years ago
Read 2 more answers
Point out the correct statement.
NeTakaya

Answer:

Option D is correct.

Explanation:

Cassandra labeling information with such a gravestone indicates should restart transmitting an erase request to such a duplicate that had been down earlier of deletion.

Cassandra may not instantly delete information labeled for removal from disc the removal of identified information takes place throughout compaction a deleted section may reappear when a maintenance is never regularly carried out.

4 0
3 years ago
Other questions:
  • ¿como influye la tecnologia en su vida cotidiana?
    7·1 answer
  • If a device does not require a driver, it is _____.
    6·1 answer
  • Which of the following should you do first when planning your career
    11·1 answer
  • (08.03 MC) Maya is a senior in high school and would like to pursue a career in web design. She needs more information about wha
    11·2 answers
  • Need help ppplllleeeassse<br><br> Hhheeelllppp
    15·2 answers
  • When someone makes a bad or immoral decision because a group of their friends is also doing it, it is called:
    10·1 answer
  • Use the Bisection Method to find the root 2. Write a main program and a function program 3. Main Program a. define constants b.
    9·1 answer
  • In this program you will read in the number of seconds and convert it to days, hours, minutes and remaining seconds.
    8·1 answer
  • Which item can you add using the tag?
    10·2 answers
  • Why does the use of passwords put the overall security of the network in jeopardy?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!