1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rama09 [41]
3 years ago
15

1) If a client requests timestamping every two minutes, how would it look? a) [00:02:00] b) [00:06:00] c) (00:04:00)

Computers and Technology
2 answers:
Alchen [17]3 years ago
8 0
Look on google hah.
Ket [755]3 years ago
8 0
A) [ 00:02:00 ]                                                             
this is the answer because of how time in a digital outspect is set up.
You might be interested in
Describe the difference between fuses and circuit breakers. where might each type of device find its best use? g
ycow [4]
Here i found this link that might help!
https://study.com/academy/lesson/the-differences-between-fuses-circuit-breakers.html

Have a nice day!
3 0
4 years ago
How many days till earth ends
expeople1 [14]
Several Billion years
5 0
3 years ago
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type
malfutka [58]

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

6 0
3 years ago
Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understandi
Murrr4er [49]
Yes you can but it helps to understand the technical details so if there is ever an issue you could identify and fix said issue easier.
8 0
3 years ago
research the internet and develop a list of three important rules/standards you will give to the team to help everyone easily fi
natima [27]
The three important rules/standards that I can give to the team to help everyone easily find the documents in the future are the following:
1. Develop naming convention on how to define filename/documents.
2. All changes in the documents must be well documented, there should be a record of changes.
3.There must be a defined standard procedures on how to save and access the file, and who are allowed to modify the documents.
6 0
4 years ago
Other questions:
  • In what scenario should dhcp servers also be active dhcp clients?
    8·1 answer
  • The clerk ordered three ribbons, 12 markers, and 15 erasers.
    10·1 answer
  • A researcher makes a _____ about another population when she makes a generalization.
    15·1 answer
  • Retype the statements, correcting the syntax errors.
    8·1 answer
  • After you save a table, the new table name appears ____.
    12·2 answers
  • A library function that can find one string inside another is:
    9·1 answer
  • Alan wants to buy camera support equipment that would provide mechanical support to his camera and which could also store extra
    5·1 answer
  • Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not
    14·1 answer
  • Write a program to have the computer guess at a number between 1 and 20. This program has you, the user choose a number between
    9·1 answer
  • Which command must you use at the command prompt to determine the names of the network interfaces (including the isatap interfac
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!