1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ValentinkaMS [17]
3 years ago
14

Cuáles eran las condiciones de vida de las mujeres durante el renacimiento perduran​

Computers and Technology
1 answer:
yan [13]3 years ago
6 0

Answer:

Las condiciones de vida para las mujeres durante el renacimiento eran muy precarias debido a que estas tenían prácticamente único rol y era el de ser buena ama de casa y dar a luz muchos hijos, sin embargo la labor de parto era extremadamente riesgosas y la mayor parte de las mujeres morían dando a luz.

You might be interested in
Is the wireless network you own as secure as it should be? Examine your wireless network or that of a friend or neighbor and det
AleksandrR [38]

Answer:

See explaination

Explanation:

Wireless Security:

In a bid to examine the network you can use ipconfig /all command in windows or in the event where you are a linux user type in ifconfig to view all the configuration details of your network such as

indows IP Configuration

Host Name . . . . . . . . . . . . : myvpc-hb

Primary Dns Suffix . . . . . . . : example.com

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . : Yes

Ethernet adapter Local Area Connection:- - - - - -

Connection-specific DNS Suffix . :- - - - - -

Description . . . . . . . . . . : Intel 68540-Based PCI Express Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-03-AA-BC-CA-8F

Autoconfiguration Enabled . . . . : Yes

Link-local IPv6 Address . . . . . : fe65::ab56:ccb9:320c:524d%8(Preferred)

IPv4 Address. . . . . . . . . . . : 192.168.45.111(Preferred)

Default Gateway . . . . . . . . . : 192.168.15.1

DHCP Server . . . . . . . . . . . : 192.168.15.1

DHCPv6 IAID . . . . . . . . . . . : 201327615

Note: If you want to deeply examine the your network and to find security model go with Wireshark application.It will help you to capture the data packets easily using GUI.Also it will provide other details like transmission control protocols,etc.

To take your network to highest level i.e. to make it more secure you can use:

1.Firewalls like application gateways,packet filtering,hybrid systems.

2.Crypto cable routers

3.Virtual private networks, etc.

Estimation of cost and the time to increase the level is solely depends on the type of the architecture you want to use for the network building structure.Also the size of the network will be responsible for the cost and time.

In case of any attack on your computer it depends on the size of the data on the computer disc and the bandwidth of the network to which your computer is connected to replace all data. The faster the bandwidth of the network,faster the data replacement rate.

3 0
3 years ago
References inserted initially as footnotes can be converted to endnotes through an option in the software.
Vesna [10]
The answer is A. True
3 0
3 years ago
Read 2 more answers
A software team is setting an automation strategy and begins by identifying business processes that could benefit from automatio
mixas84 [53]

B is what I would guess.

5 0
2 years ago
[True/False] Mainframes, unlike microcomputers, allow users unlimited and flexible access to computing power.
Lemur [1.5K]

Answer:

The given statement is "False".

Explanation:

Mainframes computer are also known big iron computer basically Mainframe computer is used by the big organization when the organization needs to work in the high-level project. The mainframe has big data processing. It is highly used in critical applications such as ERP(Enterprise resource planning).

A mainframe computer is not a flexible computer also they are not potable .microcomputers, are more flexible computers we can easily work on the microcomputers.

So the given statement is False.

8 0
3 years ago
Felicity wants to capture the attention of the regular subway commuters in her area though her print advertisements​
mel-nik [20]

Answer: billboard

Explanation:

Plato answer

8 0
3 years ago
Other questions:
  • . Hackers generally disguise their IP address. True False
    9·1 answer
  • How can this be achieved? Universal Containers stores invoices in SAP. Users want to view invoice data onthe related Account rec
    9·1 answer
  • Anyone watch anime, i love stay kids and they sang the op for Tower of God XD
    8·2 answers
  • Why was it important for the date format to be standardized by the
    7·1 answer
  • What are the three general methods for delivering content from a server to a client across a network
    8·1 answer
  • Can someone please help me with this ,it is my assignment of technology and agriculture year 8
    5·1 answer
  • Which three statements are true of lossless compression?
    6·1 answer
  • What is are the most efficient ways to make a slide presentation?
    12·2 answers
  • Define a function below, posodd_number_filter, which takes a single numerical argument. Complete the function to return accepted
    10·1 answer
  • Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addre
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!