1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
devlian [24]
3 years ago
6

They are correct? thank you!

Computers and Technology
2 answers:
Natalka [10]3 years ago
5 0
Yup seems right bro
SashulF [63]3 years ago
3 0

Answer:

YES IT IS RIGHT ANSWER

Explanation:

WELCOME :)

You might be interested in
Which of the following bit patterns represents the value -9 in two’s complement notation?
nadya68 [22]

Answer:

B. 11110111

Explanation:

Binary representation of number 9 = 00001001

Binary representation of -9 would involve calculating the twos complement representation of 00001001

First we compute the ones complement of this number by reversing the bits.

00001001 => 11110110

Next we calculate the twos complement representation by adding 1 to the ones complement.

11110110+1 = 11110111

So the final representation is 11110111.

5 0
3 years ago
Which of these statements about PNG is true?
Amiraneli [1.4K]

Answer:

d

Explanation:

6 0
2 years ago
Read 2 more answers
A digital certificate system: Group of answer choices uses digital signatures to validate a user's identity. is used primarily b
kompoz [17]

Answer:

uses third party CAs to validate a user's identity

Explanation:

The Digital Certificate is the only means that technically and legally guarantees the identity of a person on the Internet. This is an essential requirement for institutions to offer secure services over the Internet. Further:

The digital certificate allows the electronic signature of documents The recipient of a signed document can be sure that it is the original and has not been tampered with and the author of the electronic signature cannot deny the authorship of this signature.

The digital certificate allows encryption of communications. Only the recipient of the information will be able to access its content.

4 0
3 years ago
What chage command should you use to set the password for jsmith to expire after 60 days and give a warning 10 days before it ex
nata0808 [166]

chage -M 60 -W 10 jsmith Forces jsmith to keep the password 60 days before changing it and gives a warning 10 days before changing it.

<h3>Which command should you use to set the expiration date for a user account?</h3>

The “chage” command is used to modify the password expiry date of the user's account in which you can change the current status of the expiry date, set expiry date to lock the account, active and passive status, and warning days before the account get expired.

<h3>What is chage command Linux?</h3>

The chage command is self-described as the "change user password expiry information" utility. According to the chage man page: The chage command changes the number of days between password changes and the date of the last password change.

To learn more about chage command, refer

brainly.com/question/13084023

#SPJ4

7 0
1 year ago
Your friend Amy calls you asking for help with her new LCD monitor. She says the monitor isn't showing the whole picture. What i
swat32

Answer:     probably 1080p (which is HD)

Explanation:    Lcd monitors mainly support 1080p.

3 0
3 years ago
Other questions:
  • An advertiser who sells coffee beans adds the keyword “Java'” to an ad group. After two weeks, she runs a placement performance
    8·1 answer
  • This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.
    14·2 answers
  • A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
    10·1 answer
  • Window frame will expand to fill the entire desktop when you
    12·1 answer
  • A _______ policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or
    5·1 answer
  • Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which optio
    7·2 answers
  • Word templates include pre-made flyers which may be edited and saved only if permission is obtained from the Microsoft Office te
    11·1 answer
  • (Count the occurrences of words in a text file) Rewrite Listing 21.9 to read the text from a text file. The text file is passed
    10·1 answer
  • What is modularity?
    9·1 answer
  • Random.choice will choose a number between 1 and 100. True False​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!