1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
3 years ago
7

Can some one please help

Computers and Technology
1 answer:
sdas [7]3 years ago
7 0

Answer: It probably will cost a lot of money

Explanation:

You might be interested in
Which command is used to combine two or more cells together into one cell?
Tju [1.3M]
B is your answer I believe
5 0
3 years ago
Read 2 more answers
Kylie lives near a beautiful beach and has grown up surfing the waves. Many families come to visit her area and Kylie has notice
ch4aika [34]
La gente de que no me han dicho que me ha dado un teléfono y me han
4 0
3 years ago
You run the ipconfig command on your computer, and it reports an IP address of 169.254.75.10 on the Ethernet interface. Which de
Ray Of Light [21]

Answer:

This IP address is assigned to the interface by the following device:

d. The local computer

Explanation:

  • Ipconfig command is also known as Internet protocol configuration command. It is command line tool that is used to configure the IP of network connections. This command give us information about the information about IP and other parameters like default gateways.
  • The IP address 169.254.X.X is such IP address that can have values from 169.254.0.1 to 169.254.254.
  • 169.254.X.X is a Automatic Private IP Address that tells that our computer is not connected with the internet because the computer is not getting IP address from server.
5 0
4 years ago
¿Who is the target user of the bird quiz?
ella [17]

Answer:

sorry

Explanation:

8 0
3 years ago
During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poo
Paraphin [41]

Answer:

C. Man-in-the-middle; well-controlled storage of private keys.

Explanation:

During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured team shared drive, thus describing a well-controlled storage of private keys.

The attacker using those keys to intercept and decrypt sensitive traffic on a web server is a Man-in-the-middle attack.

5 0
4 years ago
Other questions:
  • _____ is the unauthorized entry into a computer system via any means
    9·1 answer
  • Jane is a full-time student on a somewhat limited budget, taking online classes, and she loves to play the latest video games. S
    12·1 answer
  • Hazel has just finished adding pictures to her holiday newsletter. She decides to crop an image. What is cropping an image?
    5·1 answer
  • 1. The @ symbol is used to denote:​
    7·1 answer
  • What is the operation of mouse in which it is moved while holding left button.​
    11·2 answers
  • Major characteristics of the bus in computer architecture​
    8·1 answer
  • How many different textile items would you find at a festival? (please list 5 items)
    7·1 answer
  • The <br> is an image at the top of the page that includes the title.
    14·1 answer
  • What is the size of 5th generation of computer and what language does they use??​
    12·2 answers
  • A database admin uses a SHOW statement to retrieve information about objects in a database. This information is contained in a _
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!