1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
2 years ago
10

What is the purpose of the Print Area feature?

Computers and Technology
2 answers:
Lilit [14]2 years ago
6 0

Explanation:

printing how many copies of a document should print

mojhsa [17]2 years ago
6 0

Answer:

C. selecting specific cells and ranges to print

You might be interested in
Susan will be configuring a snort network ids sensor to monitor her subnetwork. she will be using a web-based console interface
Goryan [66]
The goal of the IDS is <span> to detect all types of malicious </span>network<span> traffic and computer usage that </span>can<span>'t be detected by a conventional firewall.
</span>The fact that Susan will be using a web-based console interface to manage the IDS system, means that will need to configure an alert monitor to store the alert data recorded by the snort sensor. Correct answer: D With the alert <span>monitor Susan will monitor whether her application is running without problems.</span>
3 0
3 years ago
You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone betwe
Vsevolod [243]

Answer:

a.10GBaseSR

d.1000BaseSX

Explanation:

In Computer Networking, The 1000BaseSX is a type of cabling standard used for deploying Gigabit Ethernet networks. The SX in 1000BaseSX denotes short, and it implies that it's for use with transmissions having short-wavelength over short runs of fiberoptic cabling in a Gigabit Ethernet networks.

The SR in 10GBaseSR denotes short-range, it is exclusively used for multi-mode fiberoptic medium that uses 850nm lasers having LC duplex connector and DDM with a maximum transmission distance of 300meters in a Gigabit Ethernet networks.

5 0
3 years ago
Which output will be displayed by the following program?
wolverine [178]

Answer:

h

Explanation:

5 0
3 years ago
Read 2 more answers
In this question, we give two implementations for the function: def intersection_list(lst1, lst2) This function is given two lis
castortr0y [4]

Answer:

see explaination

Explanation:

a)Worst Case-time complexity=O(n)

def intersection_list(lst1, lst2):

lst3 = [value for value in lst1 if value in lst2]

return lst3

lst1 = []

lst2 = []

n1 = int(input("Enter number of elements for list1 : "))

for i in range(0, n1):

ele = int(input())

lst1.append(ele) # adding the element

n2 = int(input("Enter number of elements for list2 : "))

for i in range(0, n2):

ele = int(input())

lst2.append(ele) # adding the element

print(intersection_list(lst1, lst2))

b)Average case-time complexity=O(min(len(lst1), len(lst2))

def intersection_list(lst1, lst2):

return list(set(lst1) & set(lst2))

lst1 = []

lst2 = []

n1 = int(input("Enter number of elements for list1 : "))

for i in range(0, n1):

ele = int(input())

lst1.append(ele)

n2 = int(input("Enter number of elements for list2 : "))

for i in range(0, n2):

ele = int(input())

lst2.append(ele)

print(intersection_list(lst1, lst2))

6 0
4 years ago
Attackers need a certain amount of information before launching their attack. One common place to find information is to go thro
VARVARA [1.3K]

Answer:

The answer is Letter D. Dumpster diving.

Explanation:

This process of going through a target's trash is known in the community as dumpster diving. This attack is a technique used to retrieve information that could be used to carry out an attack on a computer network.

It is important to inform that the dumpster diving it is not limited to searching through  the trash for obvious treasures like acess codes or passwords written down on sticky notes.

8 0
3 years ago
Other questions:
  • A disk rotates at a rate of 7200 revolutions per minute. Seek operations (i.e., moving the access head to a desired track) take
    6·1 answer
  • The U.S. economy is a free enterprise system.<br><br> True<br> False<br><br> PLEASE DONT GUESS
    8·2 answers
  • It's better to create tables just by starting typing in the data that you want the table to store. There is no need to name fiel
    6·1 answer
  • A light or optical microscope most commonly used is called a(n) _____. bright-field microscope dark-field microscope electron mi
    8·2 answers
  • Data flow is not a major consideration when building an analytics model. T/F
    13·1 answer
  • Urgent ..algorithm and flowchart to check weather a number is odd or even ???​
    8·2 answers
  • Public class Student {
    14·1 answer
  • Credence is a student in college.
    13·2 answers
  • Which of the following describes a recording scout's job in the music industry?
    5·2 answers
  • State the base of correct addition of 27 + 6 =34​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!