1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
2 years ago
7

There are main type of memory

Computers and Technology
1 answer:
BARSIC [14]2 years ago
8 0

Answer:

Random acess memory (RAM)

Explanation:

You might be interested in
Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with
Shtirlitz [24]

Answer:

Explanation:

From the given information;

We will like you to understand that the source port numbers and destination port number can be any number. For that reason, the ones being used here will just be examples.

NOTE:

That the destination port numbers sent from A to S and B to S are the same in their segments.

That the destination port numbers sent from S to A and S to B are the same in their segments.

From A to S, the segment sent possibly could have the source port number 467 and destination port number as 23(Telnet)

From B to S, the segment sent possibly could have the source port number 513 and destination port number as 23(Telnet).

From S to A, the segment sent possibly could have the source port number as 23(Telnet) and destination port number as 467.

From S to B, the segment sent possibly could have the source port number as 23(Telnet) and destination port number as 513.

Yes, it is possible. This is because the inclusion of  IP in the segments is to recognize the host.

No, the source ports will be different. Because source port number from A to S can't be the same from B to S at the time they are in the same host.

7 0
2 years ago
A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the netwo
Leno4ka [110]

Answer:

D

Explanation:

A zero-day vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network. An exploit directed at a zero-day vulnerability is called a zero-day exploit, or zero-day attack.

5 0
2 years ago
is there an app i can use to make a picture appear in the corner of a video then disappear after being up for a second?
Nuetrik [128]
Umm i really do not know i'm sorry
7 0
3 years ago
Read 2 more answers
Which one is correct?
VashaNatasha [74]

The top right answer

8 0
2 years ago
Read 2 more answers
A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at
Tcecarenko [31]

Answer:

Option 2 i.e., DHCP server.

Explanation:

A client approached the user to ask about their support towards investigating as well as providing necessary equipment required for implementing a SOHO system for his latest house corporation.  

So, the following SOHO router functionality facilitates the installation of IP addresses both for the cable and wireless networks on the private server.

7 0
3 years ago
Other questions:
  • True or false? You can test your marketing emails in different email clients from within the email editor.
    10·1 answer
  • Search engines enable you to
    14·1 answer
  • Susan bought a new sweater on sale for $28.93.she was charged HST of 13%.find the total amount of her bill including taxes.​
    9·1 answer
  • I will mark brainalist! ​
    5·1 answer
  • Mr. Perry has bookmarked a large number of webpages in Chrome while researching class topics. Unfortunately, he's bookmarked so
    13·1 answer
  • Describe one type of technology that is useful in producing images from space.
    9·1 answer
  • Which is the biggest known issue specific to satellite Internet connections?
    13·2 answers
  • What major criteria must a product or process meet in order to be considered emerging technology?
    7·1 answer
  • Write a class called Date that represents a date consisting of a day, month, and year. A date object should have the following m
    10·1 answer
  • Write the correct statements for the above logic and syntax errors in program below.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!