1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
9

HELP ME?!!?!?!?!?!?

Computers and Technology
2 answers:
Kamila [148]3 years ago
6 0
24 is rows, 25 is styles
german3 years ago
4 0
Trust me the answer is B
You might be interested in
Can someone help me calculate this Multimedia math:
IRISSAK [1]

Answer:

I will try to help you answer this. it seems really confusing but I'll do my best to solve it and get it back to you. Hope I'm able to help!

5 0
3 years ago
Give the value of the zero flag, the carry flag, the signflag, and the overflow flag after each of the following instructions if
Vanyuwa [196]
The correct answer is A for this question
6 0
2 years ago
Information technology student Roberta has been assigned a project on how to detect unwanted outgoing attacks. Which step is par
tino4ka555 [31]

The attacks from the malware and the viruses to the system are considered as the unwanted attacks. These attacks detection can be performed by ensuring whether the system responds to port 443 by initiating Apache.

<h3>What is the function of port 443?</h3>

The port 443 in the computer system is the virtual port that functions with the diversion of the network. The presence of the unwanted attack blocks the response of the port 443.

Therefore, to detect the attack, the response of the system to port 443 with the starting of Apache must be checked.

Learn more about port 443, here:

brainly.com/question/13140343

#SPJ1

5 0
2 years ago
You are an administrator for a large corporation and you are responsible for deploying computers often and quickly. Which server
sashaice [31]

Answer:

The deployment method to use is called Zero touch deployment

Explanation:

Zero-touch deployment or installation is considered as a high volume installation procedure for large and medium organizations. Many computers are configured remotely through the help of the command line. With this process computers are deployed often and quickly because the installations are automated.

The benefits of zero-touch deployment include the following:

  1. Easy distribution of computer resources. Resources are scarce in business, hence, there is a great need to be able to recycle business resources as often and quickly as possible.
  2. Reduces operational costs. Businesses are focused on reducing the operational cost to the barest minimum because deployment can be easily managed by internal staff, deploying zero-touch deployment will greatly reduce operational cost.
5 0
3 years ago
Draw a full binary tree of height 2. How many nodes does it have?
Paraphin [41]

Answer:

The number of nodes in a full binary tree of height 2 = 7

Explanation:

At each level k, of the full binary tree there are usually 2^{k} \\ nodes.

So the full binary tree of height 2 has nodes= 2^{0} \\ + 2^{1} \\ + 2^{2} \\.

which is 7.

6 0
4 years ago
Other questions:
  • What are some of the challenges that could arise from setting up a file management system on a computer?
    8·1 answer
  • Distance Traveled The distance a vehicle travels can be calculated as follows: For example, if a train travels 40 miles per hour
    15·1 answer
  • You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to acc
    6·1 answer
  • Speculate on how students 25 years from now will answer, "What computing innovation has had a significant impact on your life?"
    11·1 answer
  • Refer to the exhibit. A network administrator is configuring PAT on an ASA device to enable internal workstations to access the
    12·1 answer
  • Reflect on the questions below.
    7·1 answer
  • Which role involves designing and creating advertisements for marketing purposes?
    14·1 answer
  • Which of the following is a correctly named cell?<br> B8<br> BB-8<br> 8-B<br> 8B
    11·1 answer
  • When writing an algorithm, the step after carrying out your plan is "sharing results."
    5·2 answers
  • You can use _____ to track the state of each user in the application.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!