1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataliya [291]
3 years ago
12

SOMEONE PLS HELP ME

Computers and Technology
1 answer:
stealth61 [152]3 years ago
7 0
What i don’t get this i’m sorry what
You might be interested in
What does ‘‘negotiation’’ mean when discussing network protocols? give an example?
rewona [7]
Some protocols have multiple algorithms to choose from for e.g., cryptographic purposes. During connection set up, client and server negotiate which one they'll use.

One example is the set up of a TLS connection. During the handshake, the client shares a list of its supported ciphers (the 'ciphersuites'). The server responds by indicating the best one that both sides support.

4 0
3 years ago
________ refers to the ability to model components and show how the components' inputs and outputs relate to one another.
Black_prince [1.1K]

Answer:

Central Processing Unit

Explanation:

When the CPU puts the address of a peripheral onto the address bus, the input–output interface decodes the address and identifies the unique computer peripheral with which a data transfer operation is to be executed.

5 0
3 years ago
How does ur computer know that its cursor moved
Anton [14]
The sensor of a mouse connected to the computer or the touch pad being touched and swiped around on
8 0
3 years ago
Read 2 more answers
A job placement agency helps match job seekers with potential employers. The agency would like to design a simulation in order t
g100num [7]

Answer:

B

Explanation:

The point of simulating would be to eliminate the part of having to go through un patential applications and save time.

5 0
3 years ago
You are trying to create a user from the command line on a Linux computer. You get an error that permission is denied. What shou
Alisiya [41]

Answer:

preface the command with sudo

Explanation:

In the scenario being described, the best course of action would be to preface the command with sudo . This is because sudo is a program Linux operating system that allows the individual user to run programs with the security privileges of another user, which usually applies to the superuser. In this scenario, this would allow the user to bypass the error message and gain access to such a task.

5 0
3 years ago
Other questions:
  • What is the utility of a lever?
    11·2 answers
  • A form of speech that is used to clarify, describe, demonstrate, and/or explain is referred to as _____.
    7·2 answers
  • A network technician is asked to redesign an Ethernet network before some new monitoring software is added to each workstation o
    7·1 answer
  • refers to a problem-solving approach that requires defining the scope of a system, dividing it into its components, and then ide
    12·1 answer
  • With a heat exchanger, the temperature of the process fluid can be measured with a temperature-
    14·1 answer
  • A ___ is an online collaborative event that may include such features as chat, slideshows, and PowerPoint presentations.
    8·1 answer
  • How are water resources and air adversely affected by environmental degardation?​
    8·1 answer
  • 100 POINTS. DO NOT SPAM. OR I WILL REPORT.
    13·2 answers
  • How to implement switch statement in Python?
    11·2 answers
  • Write an algorithm to print the odd number from 100 to 1​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!