1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aksik [14]
3 years ago
8

21

Computers and Technology
1 answer:
Tanzania [10]3 years ago
5 0

Answer:

A website that sells computer hardware to large organizations --> .com

A website operated by the state of California --> .gov

The website of the US Coast Guard --> .mil

The website of a group of individuals who work toward protecting gray wolves --> .org

Explanation: I took the test and got it right ;)

You might be interested in
What common variation of the Server Message Block (SMB) sharing protocol is considered to be a dialect of SMB?
ser-zykov [4K]

Answer:

Common Internet File System

Explanation:

Given that the Server Message Block (SMB) has various types or variations. The most common variation of this Server Message Block sharing protocol that is considered to be a dialect of SMB is known as "Common Internet File System." This is known to serve as a form of a communication protocol for giving shared access to different outlets between nodes on a network.

Hence, in this case, the correct answer is "Common Internet File System"

8 0
3 years ago
Write a program that estimates how many years, months, weeks, days, and hours have gone by since Jan 1 1970 by calculations with
Rzqust [24]

Answer:

Explanation:

The following code is written in Java. It uses the LocalDate import to get the number of seconds since the epoch (Jan 1, 1970) and then uses the ChronoUnit import class to transform those seconds into years, months, weeks days, and hours. Finally, printing out each value separately to the console. The output of the code can be seen in the attached picture below.

import java.time.LocalDate;

import java.time.temporal.ChronoUnit;

class Brainly {

   public static void main(String[] args) {

       LocalDate now = LocalDate.now();

       LocalDate epoch = LocalDate.ofEpochDay(0);

       System.out.println("Time since Jan 1 1970");

       System.out.println("Years: " + ChronoUnit.YEARS.between(epoch, now));

       System.out.println("Months: " + ChronoUnit.MONTHS.between(epoch, now));

       System.out.println("Weeks: " + ChronoUnit.WEEKS.between(epoch, now));

       System.out.println("Days: " + ChronoUnit.DAYS.between(epoch, now));

       System.out.println("Hours: " + (ChronoUnit.DAYS.between(epoch, now) * 24));    

   }

}

6 0
3 years ago
What are the examples of shareware?
Igoryamba

Answer:

An example of shareware a compression program like Stuffit for Macs or Windows. An example of shareware is a budgeting software program that only allows you to use three categories instead of having the ability to create a full budget.

8 0
3 years ago
Read 2 more answers
In an ha configuration, which two failure detection methods rely on icmp ping? (choose two.)
Hunter-Best [27]
I believe that the multiple questions attached to this question is 

a) Hello
b) Link groups
c) Path groups
d) Heartbeats

The Answer is B and C
The physical interfaces that are supposed to be monitored are connected into a link group and a firewall failure can be triggered when one or all physical interfaces in the group failPath Monitoring helps monitor the full path to mission critical IP addresses. By default, any one of the IP addresses becoming unreachable will end up causing the firewall to change the HA to tentative state
7 0
3 years ago
The approved detail design resulting from the __________ serves as a basis for making the decision to begin production.
natita [175]
I am pretty sure, that complete answer looks like this: The approved detail design resulting from the <span>Critical Design Review</span> serves as a basis for making the decision to begin production. Critical Design Review is needed to ensure that system can meet stated performance including costs and risks.
8 0
4 years ago
Other questions:
  • Print either "Fruit", "Drink", or "Unknown" (followed by a newline) depending on the value of userItem. Print "Unknown" (followe
    13·1 answer
  • Who were called “freedmen” during the reconstruction period?
    15·2 answers
  • How should you handle possible suicides:
    10·1 answer
  • Assign jsonData with the parsed value of the stringData variable. Then, assign 29 to the points property in jsonData and assign
    13·1 answer
  • Which statement describes one drive?
    6·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    15·2 answers
  • Why security must be planned, tested, and ready by the time the erp implementation is at go-live?
    11·1 answer
  • Your network has four Hyper-V hosts, which are running three domain controllers and about 10 member servers. Three of the member
    10·1 answer
  • Examples of application software​
    7·2 answers
  • What is wrong with the following code?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!