1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
5

Thatking374

Computers and Technology
1 answer:
PtichkaEL [24]3 years ago
5 0

Answer:

que es eso no entiendo espero que te respondan

You might be interested in
How do I make Dank memes
Dmitrij [34]

Well bro you see what you gotta do is be a gamer.

HIT OR MISS

I GUESS THEY NEVER MISS

H U H ?

YOU GOT A BF?

I BET HE DOESNT KISS YA

M U A H


It be like that sometimes b r u h

6 0
3 years ago
Read 2 more answers
Given the following output from /etc/fstab, which filesystems will be automatically checked on boot by the fsck command? [BEGIN
leva [86]

Answer:

Details below

Explanation:

From the following output we will get: /, /dev/pts, and /dev/shm while fsck is running automatically at boot for all filesystems

6 0
3 years ago
________is one color shade gradually progressing to another shade of the same color or one color progressing to another color.
posledela

Answer:

Gradient fill

Explanation:

A gradient fill is a visual effect that makes a three dimensional color look by mixing one color shade gradually progressing to another shade of the same color or one color progressing to another color. for example a dark red progressively changing to light red or red progressively changing to blue.

8 0
3 years ago
Your isp connects to the core routers of the internet via a _____. cable mode spine backbone satellite
melisa1 [442]

fairly certain its backbone

5 0
4 years ago
Your company deals with highly confidential information, some of which is transmitted via email among employees. Some documents
S_A_V [24]

Answer: AD RMS(Active Directory Rights Management Services)

Explanation: Active Directory Rights Management Services (AD RMS) is the tool for security that provides the protection of data .The security of data is maintained by the policies and regulation of data accessing that are implemented on data .

The working of the AD RMS is based on the RMS applications which encrypts the document and generates the regulation and stamp to collect them in an individual files.This helps in protecting the information that being created and consumed.

7 0
3 years ago
Other questions:
  • Waterpower was first harvested by ancient societies using
    5·1 answer
  • Which consumer document is most likely to help you if you have trouble figuring out how to operate a device
    6·1 answer
  • Object-oriented programs employ a group of techniques for handling errors called ________ handling.
    12·1 answer
  • What is a printed copy of computer output called
    10·2 answers
  • What lets you do many things, like write book reports and stories?
    15·1 answer
  • What does the internet engineering task force (IEFT) do?
    5·1 answer
  • What are some good electronics that I can buy on Amazon?
    14·1 answer
  • What 2 important components are found on a motherboard? (2 points each)
    13·1 answer
  • From Blown to Bits why is it important to know what children are doing on the Web Tonight?
    7·1 answer
  • Write a program second.cpp that takes in a sequence of integers, and prints the second largest number and the second smallest nu
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!