1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastova [34]
3 years ago
7

An alternative to configuring individual workstations is to establish configurations dynamically when the computers connect to t

he network. What is this approach called?
Computers and Technology
1 answer:
Lapatulllka [165]3 years ago
6 0

Answer:

come help me on my last question please

Explanation:

You might be interested in
Lacking in movement, action, or change, especially in a way viewed as undesirable or uninteresting�
Elenna [48]

Answer:

Static

Explanation:

I just took the test man!

5 0
3 years ago
Tom is trapped on the top floor of a department store. It’s just before Christmas
Artemon [7]

Answer:

tom wants to help her

Explanation:

Tom is rushing because he is at the top of a department store and he can't get a hold of her.  

5 0
3 years ago
Read 2 more answers
An administrative assistant types a document, saves, and prints. The assistant is using _____.
9966 [12]
The answer to your question is software. 
3 0
3 years ago
Calcula l'energia (Kwh) consumida per una màquina de 30 CV que funciona durant 2 hores.
Sveta_85 [38]

Resposta:

44,76 Kwh

Explicació:

1 cavall = 746 watts

Per tant, 30 cavalls es convertiran en:

30 * 746 = 22380 watts

Temps = 2 hores

La quantitat d'energia consumida s'obté mitjançant la relació:

Energia consumida = Potència * temps

Energia consumida = 22380 watts * 2 hores

Energia consumida = 44760 Wh

A quilowatts (Kwh)

44760 Kwh / 1000 = 44,76 Kwh

4 0
3 years ago
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
Other questions:
  • Before text can be formatted you must first
    10·2 answers
  • I only want someones opinion on this not anything you would find in a book.
    7·1 answer
  • How would you determine if your earned credits would transfer to a regionally accredited school?
    14·2 answers
  • Match the parts of a CPU to their fuctions
    8·1 answer
  • __________ refers to the idea that eachemployee should report
    14·1 answer
  • Name this<br><br>The feature allows you to add text/picture in the background of the document. ​
    11·1 answer
  • مسألة لبرنامج الماتلاب لمصفوفة وعمود
    10·1 answer
  • What are the main features cyber law of Nepal​
    13·1 answer
  • Why would students most likely need to collect data? Check all that apply.
    12·2 answers
  • 2 red and 2 overlapping balls in the center are surrounded by a green, fuzzy, circular cloud with a white line running through i
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!