1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxMikexx [17]
3 years ago
5

What are the five Ws? (I don’t even know what this means)

Computers and Technology
2 answers:
scZoUnD [109]3 years ago
5 0
Who what when where was
Advocard [28]3 years ago
3 0

Answer:

HII

Explanation:

Who, What, When Where, and Why.

You might be interested in
Which of the following is an example of a problem that could be attributed to poor ergonomics?
Alenkasestr [34]

I would say B because Carpal tunnel syndrome is caused by repetitive flexing and extending of tendons (it gets worse if it's for a long time) pressure on the median nerve can cause pain numbness and weakness in the hand and wrist. So this is the best answer as it shows there is a poor working environment it would be better if there was something as simple as a mouse pad that the wrist could lay on while using the mouse for example or using padding on the desk could improve the working environment and prevent this.

4 0
3 years ago
In modern web design, color, font, font size, and style should be declared using:
inn [45]
They should be declared using style sheets (CSS).
5 0
3 years ago
What authentication protocol is ticket-based and is used by windows computers that are members of an active directory domain?
Temka [501]
Your IP address, also known as Internet Protocol
7 0
3 years ago
Which of the following is NOT true about a flow chart?
SCORPION-xisa [38]
I think the answer is A
4 0
3 years ago
Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt
Sphinxa [80]

Answer:

Encapsulating Security Payload (ESP)

Explanation:

Encapsulating Security Payload is also known as ESP, it is a protocol that exists within IPSec, it helps in determining the authentication, integrity and how confidential network pack data / Payload in IPV4 and IPV6 networks are.

ESP supplies messages /Payload encipher, it also helps in authenticating Payload as well as where it originated from in the IPSec protocol suite.

6 0
3 years ago
Other questions:
  • What type of Windows Server is the most likely server to be targeted by a computer hacker?
    13·2 answers
  • What is the correct order of network types when categorized by their size or the physical area they cover, from largest to small
    10·1 answer
  • What are the names of the two main characters in pirates of silicon valley
    5·1 answer
  • What is the full word of"VPN"?​
    15·2 answers
  • ________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared po
    9·1 answer
  • What important feature of an email gives you a clue about what the sender wants to tell you?
    12·2 answers
  • In order for bitlocker to protect the system volume without the aid of an external drive, your computer must:
    12·2 answers
  • Suppose you want to boot a VM from its virtual DVD drive, but it boots to the VM’s hard drive. Which of the following could be t
    12·1 answer
  • How to square a number in java.
    15·1 answer
  • Should a UDP packet header contain both Sour Port # and Destination Port #?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!