1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Umnica [9.8K]
3 years ago
14

Who the heII is apsiganocj

Computers and Technology
2 answers:
umka21 [38]3 years ago
6 0
I don’t even know either
myrzilka [38]3 years ago
4 0

your mom lm ao XD ........

You might be interested in
The Left Shift key is used to capitalize which keys?
pickupchik [31]
They both do the same thing. 
5 0
4 years ago
Read 2 more answers
Karen is designing a website for her uncle's landscaping business. She wants to ensure that it's engaging and provides a lot of
Rashid [163]

Explanation:

Talk About The Benefits. of your  service over other compines

4 0
3 years ago
What's the most common method used to configure a vlan-capable switch?
Charra [1.4K]
Eating is. Sorry i dont know the answer i just need points
6 0
4 years ago
Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of t
levacccp [35]

The Traffic Light Protocol (TLP) was created in order to facilitate greater sharing of information. TLP is a set of designations used to ensure that sensitive information is shared with the appropriate audience. It employs four colors to indicate expected sharing boundaries to be applied by the recipient(s).

cisagov

3 0
3 years ago
What specific parameter will allow you to base a recursion policy on the subnet address of the clients?
Nookie1986 [14]

Answer:

Client subnet

Explanation:

Client subnet is a mechanism for recursive resolvers that helps to send partial client IP address information to authoritative DNS name servers. It is a group of IP subnets and it is identified by a name.

It is with the aid of client subnet that you base recursion policy on the subnet address of the clients.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is an example of new and emerging classes of software?
    11·2 answers
  • What aspect do you need to keep in mind when you add images in a word document?
    11·2 answers
  • 1.) You are a digital forensic examiner and have been asked to examine a hard drive for potential evidence. Give examples of how
    13·1 answer
  • We use them every day, but what is the overall purpose of a search engine?​
    10·2 answers
  • Authorization is a set of rights defined for a subject and an object. They are based on the subject’s identity.a. Trueb. False
    9·1 answer
  • Five corporations own over 90 percent of the media in the US.<br> 1.True<br> 2.False
    7·1 answer
  • Compare and contrast CD and DVD?
    10·2 answers
  • What is the main difference between a fileserver and network attached storage (NAS)?
    10·1 answer
  • Question 8 of 10
    12·1 answer
  • What is an insertion point?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!