1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
5

9. "मेरे तो गिरधर गोपाल, दूसरो ना कोई

Computers and Technology
1 answer:
icang [17]3 years ago
3 0

Answer:

what the heck...

You might be interested in
A software is made from​
andriy [413]

Answer:

Two or more languages are used for making one particular software.

5 0
3 years ago
What is a fax machine used for
pickupchik [31]

Answer:

A fax machine is used to send documents over a phone network.

Explanation:

The transmission that is sent is called "Faxes"

The easiest way to understand this is by having one person print a document at someone else's house. It is also a live time like a telephone, or like a text message.

4 0
3 years ago
Which of the following commands can be used to display socket information out to the terminal screen
Slav-nsk [51]
Linus ss

Explanation:

The ss (socket statistics) command provides a lot of information by displaying details on socket activity. One way to get started, although this may be a bit overwhelming, is to use the ss -h (help) command to get a listing of the command's numerous options. Another is to try some of the more useful commands and get an idea what each of them can tell you.

One very useful command is the ss -s command. This command will show you some overall stats by transport type. In this output, we see stats for RAW, UDP, TCP, INET and FRAG sockets.
6 0
2 years ago
Many people use relative location on a daily basis by using __________. A.
kkurt [141]
Many people use relative location on a daily basis by using B) their mental maps of an area.
You know what a certain area looks like, at least approximately, so you don't need to use these other options on a day to day basis. You can rely on your mental maps to do the work for you.
6 0
3 years ago
A polyalphabetic cipher uses many ___
Greeley [361]

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

3 0
3 years ago
Other questions:
  • what properties are associated with all Microsoft Office files and include author, title, and subject
    5·1 answer
  • Which of the following is a characteristic of the internet today? distributed network central hub lack of protocols absence of c
    5·1 answer
  • A token is combination of hardware and software that acts as a gatekeeper and prevents unauthorized users from accessing private
    11·1 answer
  • The ash and dust from a volcanic eruption can cause a ______ change in the environment.
    8·1 answer
  • Menus are attached to the windows by calling
    15·1 answer
  • HELP PLSSS I WILL MARK U!!!!
    10·2 answers
  • How can IT infrastructure be linked to the business strategy of any organization
    9·1 answer
  • Which tool ia used to create the world wide web?
    15·1 answer
  • Who is responsible for the actions of autonomous systems? (please help me :C)
    14·2 answers
  • What does business informWhat does business information management do?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!