1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivan
3 years ago
6

Short note about micro miniaturzation​

Computers and Technology
2 answers:
Ghella [55]3 years ago
3 0

Answer:

the manufacture of extremely small versions of electronic devices.

lord [1]3 years ago
3 0

Explanation:

asks

mxskssssksskwlwslskamzmzmsmsmz

You might be interested in
Households play a role in the circular flow of goods by
BaLLatris [955]

Answer:

People in households buy goods and services from businesses in an attempt to satisfy their unlimited needs and wants.

Explanation:

Households also sell their labor, land, and capital in exchange for income that they use to buy goods and services that firms produce.

6 0
3 years ago
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
4 years ago
Please help it's my last question
Yuki888 [10]

Explanation:

here is your answer.. of. different between client / server architecture and peer to peer architecture of the network.

6 0
2 years ago
Read 2 more answers
HELPPP ME PLEASEEE!!
natita [175]
It’s the last one! The key to an effective persuasion is to know what you want and be clear about your response.
4 0
3 years ago
Look at the color key below the map that shows the overall performance range. What is the range for 1 Year Performance? How does
swat32

A performance range simply means the threshold and maximum percentage of shares that may become earned.

<h3>What is a performance range?</h3>

Your information is incomplete. Therefore, an overview will be given. A performance range is the maximum percentage if shares that may become earned shares due to the attainment of the requirements of the performance.

It should be noted that in this case, the opportunity to incentivize performance will be associated with the relative performance.

Learn more about performance on:

brainly.com/question/26256535

5 0
2 years ago
Other questions:
  • Elisa and josh need to access general helps. Elisa will press the F1 key. josh will on ?. who will access general help
    15·1 answer
  • Write a function with this prototype:
    8·1 answer
  • The website of an international human rights organization stores a large database of information and provides search functionali
    15·1 answer
  • Is USA TestPrep a test-taking site that won't let you access other windows without kicking you off?
    13·1 answer
  • Develop a C++ program that will determine whether a department store customer has exceeded the credit limit on a charge account.
    13·1 answer
  • Question 4 (Multiple Choice Worth 5 points)
    6·1 answer
  • Which of the following is not true about network design?Group of answer choicesIn designing LAN networks, network designers tend
    11·1 answer
  • I have a very quick question. So im applying for Early college and i need some future educational goals and maybe im just thinki
    6·1 answer
  • Please help me on this please i am giving all of my points so please help me
    6·1 answer
  • How does applying Fontworks effects to text on an advertising flyer change the text?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!