1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ch4aika [34]
3 years ago
5

In this class, it is very common for your computer screen to look like this. What is this?​

Computers and Technology
1 answer:
Vsevolod [243]3 years ago
8 0
Theres no Picture???
You might be interested in
Suppose you are given a sequence that is described by a formula, starting at index n=0. If you need to change the starting index
Arisa [49]

Answer:

n+1

Explanation:

Given

n = 0 --- starting index

Required

Change the starting index to n = 1

We have:

n = 0

To change the starting index to k, we simply rewrite as:

n+k

<em>In this case; k=1; so, the starting index will be: </em>n+1<em />

3 0
3 years ago
Select all the correct answers.
oksian1 [2.3K]

Answer:

It's probably "facilitate discussions"

Hope this helps you!

Bye!

4 0
3 years ago
Read 2 more answers
Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based
Nikolay [14]

Answer:

Secure Sockets Layer (SSL)            

Explanation:

  • SSL is a  standard security technology for setting up an encrypted link between a server and a client (in this case web browsers and web server).
  • SSL is a security protocol that transmits sensitive information securely.
  • As we know data transmitted between browsers and web servers is sent in the form of plain text.
  • If a hacker is able to seize data being transmitted between a browser and a web server, they can misuse that information.  
  • So SSL makes the web servers and web browsers to communicate with each other securely.
  • When transmitting confidential information, a web server and browser set up a secure connection using SSL certificate.
  • The link between web server and browser is encrypted by SSL which makes sure that all data transmitted between them remains private and protected.
  • Due to the sensitive nature of the business SSL is most suitable solution to keep sensitive information sent across internet encrypted making sure that only intended receiver can access it.
  • SSL certificate is used for authentication purpose.
  • For making sure that information is sent to right server, web browsers give indication of secured connection via a lock icon attached or uses https.
5 0
3 years ago
Traditionally, remote administrative access on routers was configured using Telnet on TCP port 23. However, Telnet was developed
FinnZ [79.3K]

<u>Explanation</u>:

It is an all-too-often used technology today in connecting several computers together via a network.

Routing simple terms means the action of selecting the path taken by the traffic of data in a network of computers. The routing systems involve the use of both wireless and cable based architectures. Some common example of routing systems includes:

  1. Dynamic Routing
  2. Static routing
  3. Default Routing
5 0
3 years ago
What kind of waste does a computer generate?<br><br> Will give brainly :3
Lena [83]

Answer:

waste???? a computer??

7 0
3 years ago
Other questions:
  • The more critical a component or service, the higher the level of availability required. True False
    5·1 answer
  • With respect to the five components of social media information systems (SMIS), which of the following statements is true of SM
    11·1 answer
  • Is sprint having problems today
    11·1 answer
  • What is a sequence of graphic illustrations which represent the planned scenes for a video or animation?
    6·2 answers
  • after landing, you are tying down the aircraft when a person approaches and asks: "faa. are you the pilot of this aircraft?" wha
    11·1 answer
  • Which of the following is a document view you can select using Button on the status bar?
    11·1 answer
  • susan wrote the recursive formula for the sequence represented by the exploit formula An=3+2n. put an C net to any correct state
    13·1 answer
  • Parameters and return make
    10·1 answer
  • Why do we need to use a VPN service?
    9·2 answers
  • An outpatient provides the following id: barbara jones, birth date 8/15/63. should a specimen be collected for this lab order?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!