1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-14-01-66 [18.8K]
3 years ago
13

Select the correct answer from each drop-down menu.

Computers and Technology
1 answer:
lys-0071 [83]3 years ago
6 0

Answer: A and C

Explanation:I did it before

You might be interested in
A ____________ is a set of commands which can be run by calling it by name.
mixas84 [53]
The answer to this question is a protocol.
7 0
3 years ago
Read 2 more answers
Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion dete
gizmo_the_mogwai [7]

Answer: CPU

Explanation:

The management dashboard refers to the tool that's used in the presentation of the vital k management KPIs in a single place, which is efficiently managed in order to make faster and better decisions.

Based on the information given, after the application of intrusion detection, virus, and malware protection on the Linux images, he will notices an increase in CPU on his server management dashboard.

Therefore, the correct option is C.

5 0
3 years ago
The source ip address is 164.109.28.3 subnet mask of 255.255.128.0 network address is
Sergeu [11.5K]
164.109.0.0/17




-------------------------------------------
6 0
3 years ago
HELP ME PLEASE!!!!!!!!!!!!
Mila [183]

Answer:

b b isss the right answer

5 0
3 years ago
Read 2 more answers
What is a possible explanation for the issue described below? A user reports that ever since she or he began creating animations
Marat540 [252]
VRAM because VRAM is used for graphic intensive workloads
8 0
3 years ago
Read 2 more answers
Other questions:
  • Is a protocol that allows users to log on to and access a remote computer?
    8·1 answer
  • ________ is typically used as the last string of letters in the name of a website. Group of answer choices the name of the indiv
    13·1 answer
  • What is Least effective at preventing a computer virus
    10·1 answer
  • Which topology enables only one person, at one time, to send data to others on the network?
    6·1 answer
  • How often are computer and user policies applied after a user has logged into a computer?
    15·1 answer
  • An open intersection is one that
    9·2 answers
  • Identify some advantages of using Excel over lists, paper files, or simple word documents? Describe some disadvantages of using
    15·1 answer
  • List three types of Software:
    15·1 answer
  • The idea that an object can exist separate from the executing program that creates it is called
    13·1 answer
  • You have recently compiled a custom Linux kernel. You notice some performance issues with and need to use the kernel log files t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!