1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Morgarella [4.7K]
3 years ago
9

Please answer me fast​

Computers and Technology
2 answers:
labwork [276]3 years ago
8 0

Answer:

microsoft

Explanation:

this may help u

Nuetrik [128]3 years ago
8 0

Answer:

Microsoft

because its a 2013 worldwide partner conference and Microsoft server operations

You might be interested in
in the topology configuration, hosts are connected to each other through a central controller which assumes all responsibility f
Colt1911 [192]

in the <u>star</u> topology configuration, hosts are connected to each other through a central controller which assumes all responsibility for routing messages to the appropriate host.

Define topology.

When a geometric object <u>is stretched, twisted, crumpled, or bent without closing or opening holes, ripping, gluing, or passing through itself, certain features are kept</u>. This is known as topology in mathematics.

<u>The study of datasets using </u><u>topological </u><u>methods</u> is known as topological-based data analysis (TDA) in applied mathematics. <u>Open sets are a convenient way to define the basic </u><u>topological </u><u>notions of continuity, compactness, and connectedness</u>.

To learn more about topology, use the link given
brainly.com/question/14560531
#SPJ4

3 0
1 year ago
Which one of the following terms is defined as the material and surfaces upon which an artist works?
katrin [286]

Media is the surface or material that an artist works on


5 0
3 years ago
Suppose you are an ISP that owns a / 22 IPv4 address block. Can you accommodate requests from six customers who need addresses f
lisabon 2012 [21]

Answer:

It is not possible.

Explanation:

In this example, we need to accommodate 473 computers for six clients that are 473 IP addresses.

For this request just we have /22 IPv4 address blocks, this mean

22 red bits 11111111111111111111110000000000 <--- 10 host bits

We must increase red bits to 25, we need these 3 bits to create 6 sub red, in this case, 2^3 = 8 sub red.

Why did we ask 3 bits? Because if we ask only 2, 2^2 = 4, and we need 6 sub red.

25 red bits 11111111111111111111111110000000 7 host bits

In this case, we need more than 260 computers, but just we have 7 bits, this means.

2^7 = 128 and just one customer needs 260, for that is impossible.

7 0
3 years ago
Mark for review (Will be highlighted on the review page) 11. A feature in Excel that allows you to graphically display in a sing
Tresset [83]
A feature in Excel that allows you to graphically display in a single cell the trend across a range of cells is called a sparkline.
8 0
3 years ago
You need to fax a portion of a map from a large hard-cover atlas to a client from an internal fax-modem. To fax the map, the bes
Kay [80]
The fax modem is used to send and receive fax messages by only having phone line (fax machine is not required). The scanned documents should be saved as digital file (image or PDF format) in order to be sent. So, in order to send a portion of a map you should first convert the map into digital file and than simply send it through the fax modem. The best way to convert it to a digital file is to use an optical character recognition (OCR). 
6 0
3 years ago
Other questions:
  • A. True
    8·2 answers
  • Select the correct answer.
    9·1 answer
  • ________ is a set of rules for exchanging files such as text, graphic images, sound, video, and other multimedia files on the we
    14·1 answer
  • When assembling a desktop computer you should always install the drives before the motherboard?
    9·1 answer
  • Technician A says that PTC heaters can be built into a conventional heater core assembly. Technician B says that a PTC heater's
    11·1 answer
  • Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize th
    13·1 answer
  • What does 69 mean?<br> Whenever I watch memes they always talk about the number 69
    8·2 answers
  • ...................is a high level, structured , open source programming language​
    10·1 answer
  • List the two page orientations in Microsoft word​
    10·1 answer
  • The retention of encoded information over time refers to
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!