1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddika [18.5K]
3 years ago
5

Please help me. It's due in 2 hours.

Computers and Technology
1 answer:
Neporo4naja [7]3 years ago
3 0
1d 2b 3c 4a 5e 6f 7g
You might be interested in
______________is a collection of technologies for abstracting the details of how applications, storage, network, and other compu
Daniel [21]

Answer:

The correct answer to the following question will be "Cloud computing".

Explanation:

A series of technologies too abstract the specifics of how users are supplied with the software, data, network, and other computing services, called Cloud computing. On-demand, the accessibility of computer resources, database space, and computational complexity, with little or no particular active user administrators.

This term is commonly used to define network infrastructure which is available to several users over the internet.

There are different types of cloud computing. These are as follows:

  • Infrastructure-as-a-Service (IaaS).
  • Software-as-a-Service (SaaS).
  • Platform-as-a-Service (PaaS).

Therefore, Cloud computing is the right answer.

7 0
3 years ago
Vector graphics are composed of solid __________,curves and other __________ shapes​
serious [3.7K]

Answer:

Lines; geometric.

Explanation:

Graphic design can be defined as an artistic process used for the creation of art works such as logos.

In the creation of various graphic files such as in 2-D or 3-D we can use a variety of software applications or programs such as Blender basics, Adobe photoshop, illustrator, Coreldraw, etc.

Graphic design involves the use of vector graphics, bitmap graphics or raster graphics.

Vector graphics are composed of solid lines, curves and other geometric shapes that are typically defined by series of mathematical instructions. Thus, vector graphics can be scaled to a smaller or larger size without any change in its quality.

5 0
3 years ago
A third party intercepting a packet and downloading its information before it is sent onward toward its destination is called
SSSSS [86.1K]

Answer:

Explanation:

<u>Packet sniffing</u> is the process of capturing each packet that is transmitted over the network and analyzing its content. Most of the time, packet sniffing is used to troubleshoot network problems or to gather network statistics. The software or device used for capturing packet data is called packet sniffer, packet analyzer, network sniffer or simply network analyzer.

The Packet Sniffer Sensor monitors, among other things:

• Total traffic

• Port sniffer

• Web traffic (HTTP, HTTPS)

• Mail traffic (IMAP, POP3, SMTP)

• File transfer traffic (FTP, P2P)

• Infrastructure traffic (DHCP, DNS, ICMP, SNMP)

• Remote control (RDP, SSH, VNC)

• Other UDP and TCP traffic

Third party intercepting a packet and downloading it information before it is sent onward toward its destination is called <u>Packet Sniffer</u>

4 0
3 years ago
Look at the slide.
svetlana [45]

Answer:

c

Explanation:

5 0
3 years ago
Read 2 more answers
a 0.600 kg dynamics trolley has 1.5 kg load added. It is launched with a force of 10.n what is the acceleration
Anastaziya [24]

Answer:

acceleration = 4.76 m/s²

Explanation:

Given that"

the mass of the dynamic trolley = 0.6 kg

the mass of the load  = 1.5 kg

total mass = (0.6 + 1.5) kg = 2.1 kg

the force = 10 N

Thus;

using the formula of force which is;

Force = mass × acceleration

10 = 2.1  × acceleration

acceleration = 10/2.1

acceleration = 4.76 m/s²

7 0
3 years ago
Other questions:
  • To find the largest number in a list of numbers, use the _____.
    8·1 answer
  • What is the different between a computer and a phone?​
    15·1 answer
  • It is important to create an IT security program structure that aligns with program and organizational goals and describes the o
    6·1 answer
  • Which ammunition security category includes fragmentation grenades mines and explosives?
    5·1 answer
  • Mack has started with his first photographic assignment for a magazine. He has clicked around thirty images and uploaded them on
    10·1 answer
  • This OS was created by a developer named Torvalds.
    7·1 answer
  • Please dont delete. my teacher said to see how many people I could meet on here. THIS IS A BIG PART OF MY GRADE!! DO NOT REPORT!
    13·2 answers
  • Guys how can i video my self from my laptop <br> my laptop is (lenovo)
    8·2 answers
  • Which of these would be the best way to inform an employee that they are losing their job?
    13·1 answer
  • Cheng, a student, is researching a company's profile on a professional networking website. In what way will this kind of researc
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!