1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
11

A ____________ is a collection of commands given a name.

Computers and Technology
1 answer:
Volgvan3 years ago
6 0

Answer:

a for apple b for ball c for cat d for dog e for elephant f for exam exam exam exam exam is coming broglie read silently you why are you asking us your homework you have to write why are you asking as bye bye see you once again Tata in next video please like share comment our channel you get 30

You might be interested in
Which print setting enables multiple slides to be printed on one page?
seraphim [82]
Handouts
see the image for reference

3 0
3 years ago
Read 2 more answers
HELP PLEASE ASAP brainliest to accurate
Svet_ta [14]
A patent law

Patent laws deal with new inventions and relays to the owner’s exclusive right to the claimed invention. It is a right that should be granted by the government to an inventor, to exclude others from using, making, importing, or selling an invention. In this case, Jenna's secret, unique recipe is her patent.


3 0
4 years ago
Read 2 more answers
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
gavmur [86]

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

4 0
3 years ago
What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?
Deffense [45]
<span>The purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command is that </span>It allows many inside hosts to share one or a few inside global addresses. 
8 0
3 years ago
Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation
sesenic [268]

Answer:

B. Install in Safe Mode.

Explanation:

Since Jennifer is using the administrator account, she should be able to install the program.

Hence, she should install the anti-malware software in Safe Mode.

In Computer science, Safe Mode is a mode in which the operating system loads only the bare minimum services, process and programs to boot or start up.

Hence, Safe Mode will ensure that when Jennifer is installing the anti-malware software, no other program or service is running which may interfere with her installation.

4 0
4 years ago
Other questions:
  • A cashier distributes change using the maximum number of five-dollar bills, followed by one-dollar bills. Write a single stateme
    6·1 answer
  • An AM index between 0 and 1 indicates what? a. the AM signal is very small and will not be detected by the receiver b. distortio
    12·1 answer
  • What is used to connect computers to the internet*Audio Ports
    15·2 answers
  • On an XBOX 360, what does it mean if you get 4 red rings on your console?
    5·1 answer
  • WAP to find the area of cuboid​
    13·1 answer
  • What are three ways a person may use a computer without realizing it?
    9·1 answer
  • A printer is considered to be in the category of
    5·2 answers
  • Write short notes on the following:<br>I. keyboard ii.Control unit iii.printer​
    7·1 answer
  • This was the template given for my assignment: class Login:
    14·1 answer
  • True or false: If you have a 32-bit CPU architecture, it's recommended to use a 64-bit operating system.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!