1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alina1380 [7]
3 years ago
7

The use of space bar​

Computers and Technology
1 answer:
Anna11 [10]3 years ago
5 0
The question is unclear or unfinished please send again the question
You might be interested in
Candace opened an email from a person she didn't know and clicked on a pop-up in the email that installed a virus on her compute
Minchanka [31]

Answer:

Shut down the computer.

Explanation:

l hope it help

4 0
3 years ago
Read 2 more answers
A newer kind of mobile site can do a lot of what only apps used to do, so the line has blurred between sites and apps. what are
denis23 [38]
The answer is Progressive Website Applications. This specific type of website allows the user to have a particular website function similarly as to when you download the app natively on your device. One main advantage is that you wouldn't need to download the actual app to use its functions. As the applications we use in our mobile phone increase, the more application we need to download, and could be troublesome to have hundreds of app installed on your mobile device.
6 0
4 years ago
In what type of attack does the adversary leverage a position on a guest operating system to gain access to hardware resources a
il63 [147K]

Answer:

VM escape attack

Explanation:

<em>In a VM escape attack, the attacker exploits hypervisor vulnerabilities to gain control over resources reserved for other guest operating systems. Services operating on the guest may be exposed to the other attacks, but such attacks can only access data allotted to the same guest. In the event of a buffer overflow or directory traversal or the client in the case of cross-site scripting.</em>

6 0
2 years ago
Are DHCP messages sent over UDP or TCP? 2. What is the link-layer (e.g., Ethernet) address of your host? 3. What values in the D
maks197457 [2]

Answer:

1.) DHCP is sent over the message at UDP.

2.) The address of link-layer is Source: DellComp_4f:36:23 (00:08:74:4f:36:23)

3.) The message type of value to the discover message is 1, but the message type of value to the request packets is 3. This how you can be differentiate two.

4.) The Transaction ID in first four message is 0x3e5e0ce3

The transaction ID in second sets of messages is 0x257e55a3

The transaction ID is identifies if the message is a part of the set of the messages is related to the one transaction

Explanation:

DHCP is stands for the Dynamic Host Configuration Protocol which is the networks management protocol that is used on the UDP/IP networks where by the DHCP servers dynamically assign the IP address and the other networks configuration parameters to the each devices on the network so they can be communicate with the other IP network.

6 0
4 years ago
What can you add to your presentation from the insert ribbon toolba?
stiks02 [169]

Answer:

anything you want

Explanation:

there are a lot of adons for powerpoint

7 0
3 years ago
Other questions:
  • Dani wants to create a web page to document her travel adventures. Which coding language should she use? HTML Java Python Text
    15·1 answer
  • Emily wants to search online for cakes containing nuts. However, she wants to skip cakes that have raisins in them. Which option
    9·1 answer
  • In the borders and shading dialog box where would you look to see if your border will have two sides
    11·2 answers
  • Consider a Games Expo for Children. Six competitions are laid out for the expo. Tickets are sold according to the age and gender
    11·1 answer
  • 1. Some of the music in the 1960s was used to protest social and political issues. Is music still used as a form of protest? Why
    13·1 answer
  • Which is an example of a correct citation for a website with an unknown author?
    9·1 answer
  • Which of the following is not a type of bank? (Everfi)
    9·2 answers
  • A wireless networking technician has completed a survey of a wireless network and documented the detected signal strengths in va
    6·1 answer
  • . Is it conceivable to design a secure operating system for these computer systems? Give arguments for and against.
    6·1 answer
  • Which of the following are good ways to keep your information and your computer secure?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!