1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
coldgirl [10]
3 years ago
5

100 POINTS!

Computers and Technology
2 answers:
Eddi Din [679]3 years ago
8 0

Answer:

Edit Slide Show

Copy Link

Send in Email

Start Slide Show

Paste Link

Amanda [17]3 years ago
8 0

Answer:

Edit Slide Show

Copy Link

Send in Email

Start Slide Show

Paste Link

You might be interested in
What is the error in this program?
WINSTONCH [101]

The error in this program above is that All the blocks should be in one connected stack to function.

<h3>What are the errors in a program?</h3>

In the act of developing a programs there are some kinds of error that can take place such as syntax errors, logic errors and others.

Note that in the program above, The error in this program above is that All the blocks should be in one connected stack to function and thus there is an error.

Learn more about program from

brainly.com/question/1538272

#SPJ1

5 0
2 years ago
C. you have already verified the routing table entries for r1, now execute the show run | section interface command to verify vl
lilavasa [31]
Help help help i have same questions

5 0
4 years ago
I am having horrible trouble with deciding if I should get Audacity or Adobe Spark for recording, if someone could help me choos
lbvjy [14]

I haven't really used either, but people I know would prefer using Audacity.

5 0
3 years ago
Read 2 more answers
Nicolai wants to add demand-based content to his Website so that customers can access the information at their behest. Which aud
fgiga [73]

Answer:

The audience development technique that best describe the process Nicolal wants to implement is;

C Pull technology

Explanation:

Pull technology is a form of network mode of communication in which the initial data request comes from the client side of the network for it to be handled by the server side of the network.

Given that Nicola wants a demand-based content to his website for customers to access information when they wish to, the process is similar t the podcasting in which each new content is posted to a specific RSS feed from where it can be requested by a mobile app, directory or a RSS feed reader

The counter technology is a push technology where the servers push content to intended clients, such as for an incoming call, instant messaging, synchronous conferencing (online c h a t) and files.

8 0
3 years ago
The screened subnet protects the DMZ systems and information from outside threats by providing a network with intermediate secur
maks197457 [2]

Answer:swswsw

Explanation:swwsws

4 0
3 years ago
Other questions:
  • How can you tell which of the policies in the security options folder have changed settings?
    10·1 answer
  • Many computer users and some operating systems call subdirectories ____.
    10·1 answer
  • Hich of the following usually indicates that there is no moreinput to be read by a program?
    14·1 answer
  • Write a program that implement a bubble sort ?
    5·1 answer
  • What is nominal data?
    5·1 answer
  • Write a sequence of statements that finds the first comma in the string line, and assigns to the variable clause the portion of
    13·1 answer
  • You want to save twenty of your vacation pictures on your computer. Which is the best place to save them?
    6·2 answers
  • If you have four documents open and click the x button on the title bar, _____.
    8·1 answer
  • Where are some places that cyberbullying occurs? Check all that apply.
    15·1 answer
  • Complete the sentence.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!