1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murljashka [212]
2 years ago
15

Koi friend online hai kya​

Computers and Technology
1 answer:
Arlecino [84]2 years ago
8 0

Answer:

yes

good afternoon friend

You might be interested in
An alien from planet Tao has descended onto Earth.
DochEvi [55]

An alien from planet Tao has descended onto Earth. The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet.

Explanation:

  • A packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network.
  • Network packets are small amounts of data passed over TCP/IP networks.
  • Latency measures the time it takes between your actions and the response between your computer, the internet, and everything in between.
  • An IP address is a label which is used to identify one or more devices on a computer network. It is comparable to a postal address.
  • The Domain Name System (DNS) is vital to the Internet, providing a mechanism for resolving host names into Internet Protocol addresses. Insecure underlying protocols and lack of authentication and integrity checking of the information within the DNS threaten the proper functionality of the DNS.
  • Transmission Control Protocol is a standard that defines how to establish and maintain a network conversation through which application programs can exchange data. TCP works with the Internet Protocol which defines how computers send packets of data to each other.

3 0
3 years ago
Drag each label to the correct location on the image.
andrezito [222]

Answer:

1.) Relative cell reference - A1

2.) Absolute cell reference - $D$2

3.) Mixed cel reference - $D2

Explanation:

In Microsoft Excel, cell references are very important and critical when dealing with formula. They can give you what you’re looking for or make your entire worksheet incorrect.

A cell reference is a cell address or a range of cell addresses that can be used in a formula.

There are three types of cell references and they are;

a) Relative reference

b) Absolute reference

c) Mixed reference

A relative cell reference is a cell reference that changes when you copy the formula to other cells. It s usually just a normal cell reference like A1, B2, C3. If a formula with a relative cell reference is copied down to other cells, the formula will change. That is a formula with a relative cell reference changes with respect to the cell which it is copied to.

An absolute reference does not change when you copy the formula to other cells. In absolute references, the dollar sign $ is used to “lock” both the row and column so that it does not change when it is copied to other cells. An example is $D$2.

Using a mixed cell reference, one is trying to see that only either the row or column changes with respect to other cells when they are copied. It is like “locking” either the column or the row while changing the other. Just like from the example, $D2 is a mixed cell reference where only the column is locked such that only the row changes when the formula is copied to other cells.

7 0
3 years ago
Which of the following is used to store the memory address for variable a into pointer
weqwewe [10]
Hence D is your answer
5 0
2 years ago
Which of the following is the term for software that automatically displays or downloads unwanted offers?
slega [8]
Adware. Adware displays ads and popups. The other options are completely different from each other
5 0
3 years ago
How to reload ingenuity when a pulsating blue thing is there
Hatshy [7]
Todo is very important
4 0
3 years ago
Other questions:
  • Design a 4-bit register that can accept an input from the user and store the accepted input. The 4-bit register will operate in
    6·1 answer
  • How to burn mp3 on dvd
    13·2 answers
  • Which one of these variables has an illegal name?
    11·1 answer
  • Which type of hacker represents the highest risk to your computer?
    9·1 answer
  • You have a multi-domain Windows Server 2008 forest. You need to make a shared folder available to users from several domains. Wh
    9·1 answer
  • Why might your digital footprint be important when you are applying for collage
    13·1 answer
  • Write a function safeOpen() that takes one parameter, filename — a string giving the pathname of the file to be opened for readi
    15·1 answer
  • ____ steganography places data from the secret file into the host file without displaying the secret data when you view the host
    9·1 answer
  • ____ is one of the primary operations of a computer.
    10·1 answer
  • We can improve our knowledge and skills on animals and fish raising with the use of internet​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!