1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
5

Thatking374

Computers and Technology
1 answer:
PtichkaEL [24]3 years ago
5 0

Answer:

que es eso no entiendo espero que te respondan

You might be interested in
I will give brainliest to the first person who can answer correctly.
Mariulka [41]
I think that the answer wiloukd be B. For #31 and for #32 A.
4 0
3 years ago
Which of the following could occur when both strong and weak ciphers are configured on a VPN concentrator? (Select TWO) A. An at
Elza [17]

Answer:

A. An attacker could potentially perform a downgrade attack.

E. The IPSec payload reverted to 16-bit sequence numbers.

Explanation:

When both strong and weak ciphers are configured on a VPN concentrator, the following are likely to occur;

An attacker could potentially perform a downgrade attack

The IPSec payload reverted to 16-bit sequence numbers

3 0
3 years ago
Which would be the best and worst answer choices?
jeyben [28]

Answer:

option 3

Explanation:

4 0
3 years ago
What is not a safety practice for working near power lines?
Vesna [10]
Because there is a very likely chance you can get electrocuted which could lead to medical treatment or even death. Also if working near trees or polls or anything that is touching a power line may lead to you being electrocuted.
6 0
3 years ago
Hy <br> Anyone from kerala?
Lera25 [3.4K]

Answer:

i dont know

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • A/an ___________ is a scheduling tool that sets the standard and nonworking time for the project and is used to assess how tasks
    6·1 answer
  • Which of the following is not part of active listening?
    6·2 answers
  • Heelo how do u do python syntax lesson 11 on code academy
    12·1 answer
  • During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdroppin
    14·1 answer
  • Which would you trade on a stock exchange? A: Shares B: Bonds C: Annuities
    6·2 answers
  • Translation of a file into a coded Format that occupies less space than the original file is called
    6·1 answer
  • A(n) ________ is a chart based on PivotTable data.
    15·1 answer
  • What is the most efficient<br> form of transportation we<br> have?
    13·2 answers
  • PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
    11·1 answer
  • which two partitions do you typically create at minimum during a fedora linux installation? (choose two answers.)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!