1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
3 years ago
14

¿en minimo cuantos computadores se puede construir una red,y en maximos en cuanto y que se necesita para que este en la red?​

Computers and Technology
1 answer:
stira [4]3 years ago
3 0

Answer:

me no speak taco bell

Explanation:

You might be interested in
OSHA standards appear in the ___________ and are then broken down into ____________.
Alisiya [41]
OSHA standards appear in the Code of Federal Regulations (CFR) <span>and was then broken down into two parts. It contains standards to ensure a </span>
4 0
3 years ago
Which of the following is a palette of colors, fonts and special effects which complement one another?
seropon [69]

Answer:

Theme

Explanation:

3 0
3 years ago
A father carries the Xga blood group trait and passes it on to all of his daughters, who express it, but to none of his sons. Th
Alecsey [184]

Answer:

The correct answer to the following question will be "X-linked dominant".

Explanation:

  • X-linked dominant inheritance, also referring to it as X-linked domination, is a hereditary inheritance process through which the X chromosome bears a dominant gene.
  • This is less prominent as a pattern of inheritance than the recessive type that is connected to the X.

Hence, the given statement would show the X-linked dominant form of inheritance sequence.

5 0
3 years ago
Your manager has asked you to shift usage and consumption of technology resources from a local environment managed by in-house I
Alexus [3.1K]

Answer:

B. Cloud computing

Explanation:

Cloud computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

4 0
3 years ago
Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and inform
gtnhenbr [62]

Answer:

True

Explanation:

It is TRUE that Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and information security infrastructure elements.

The above statement is true because Internal Monitoring is a term used in defining the process of creating and disseminating the current situation of the organization’s networks, information systems, and information security defenses.

The process of Internal Monitoring involved recording and informing the company's personnel from top to bottom on the issue relating to the company's security, specifically on issues about system parts that deal with the external network.

5 0
3 years ago
Other questions:
  • In a transaction-processing system (tps), if the tps database can be queried and updated while the transaction is taking place,
    11·1 answer
  • You should code width and height dimensions for images because:
    15·1 answer
  • A must decode this code. I guess is not a Cesar. The last line is a email adress.
    15·1 answer
  • Divide (10x^3 + 19x^2 + x - 7) by (5x + 2)​
    11·1 answer
  • What is the best practice to do an SEO for a HTML website? Is there any plug-in for this?
    13·1 answer
  • What command can be used to export an nps backup file named npsconfig.xml that can be used to restore nps configuration on anoth
    12·1 answer
  • A Portable Document Format (PDF) can be opened with Adobe Acrobat Reader and many web browsers.
    14·1 answer
  • Do you have to make a account of Windows 10?
    12·1 answer
  • Which of the following is the most reliable way to check the accuracy of a website? Examine the sources cited by the website.
    6·1 answer
  • H. What is recycle bin?<br>-&gt;​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!