1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faltersainse [42]
3 years ago
9

Pat creates a table in a spread sheet

Computers and Technology
1 answer:
Anna11 [10]3 years ago
7 0

Answer:

Explanation:

Details?

You might be interested in
You just got a shipment of 10 network-attached laser printers. You want these printers to always have the same address but you w
love history [14]

Answer:

Configure Reservations

Explanation:

The reason you do this, is because you are getting a permanent IP address assignment.

Hope this helps!

6 0
3 years ago
Which option in a Task element within Outlook indicates that the task is scheduled and will be completed on a later
joja [24]
I think it’s in progress
5 0
2 years ago
Read 2 more answers
Which of the following is not hardware?
Pachacha [2.7K]

Answer:

A

Explanation:

I think it would be A because i have never heard of a virus scanner

6 0
3 years ago
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
3 years ago
Consider five wireless stations, A, B, C, D, and E.
klio [65]

Answer:

Check the explanation

Explanation:

A) Whenever C is sending to D, what other communications are possible?

C’s packet will be seen by A, B and D, but not by E. Thus, D can send to E at the sametime..

B) Whenever B is sending to A, what other communications are likely?

Even though B’s packet will not be seen by D, other nodes, e.g., E, or C, can’t send to D since the packets from these nodes will interfere with the packets from B at A. Therefore, other communications is not likely at the same time.

C) Whenever B is sending to C, what other communications are possible?

B’s packet will be seen by E, A and C, by not by D. therefore, E can send to D at the same point.

4 0
3 years ago
Other questions:
  • As a photographer, what will be the driving force behind everything that you produce?
    13·1 answer
  • Write code that does the following: opens an output file with the filename number_list.txt, uses a loop to write the numbers 1 t
    8·1 answer
  • What correctly describes the features of the service called kickstarter?
    14·2 answers
  • Why is failure important when you are designing a solution to a problem?
    6·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    11·2 answers
  • The picture above is a description of the C code below. Please modify the C below so that it uses FILE HANDLING (fopen, fputs, f
    5·1 answer
  • Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she a
    8·2 answers
  • During the preventive maintenance phase of a project involving a hydraulic power system, an engineer must change a gasket on a p
    14·1 answer
  • Fill in the Blank
    10·2 answers
  • A friend wants to design an app but has never done so before and isn't sure how to begin. What would you suggest they do first?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!