1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
3 years ago
13

. Many contemporary languages allow two kinds of comments: one in

Computers and Technology
1 answer:
larisa [96]3 years ago
7 0
Shabaka. Ajswvansja nakash a slaps alpaca sma sharkskin a jab .
You might be interested in
What is it called when two different files generate the same hashing result?
IrinaK [193]
A Hash<span> Collision Attack is an attempt to find </span>two<span> input strings of a </span>hash<span> function that </span>produce the same hash result<span>. ... If </span>two separate<span> inputs </span>produce the same hash<span> output, it is </span>called<span> a collision. </span>
4 0
3 years ago
What came first, the internet or WIFI?
horsena [70]

Answer: wifi

Explanation:

because you can't have the internet if you don't have wifi to power it up

4 0
3 years ago
The process of adding a header to the data inherited from the layer above is called what option below
Tom [10]

Answer:

The correct answer to the following question will be "Encapsulation".

Explanation:

The wrapping of the data into a single unit or the method by which a header is applied to the data inherited from the above layer is termed as Encapsulation.

While relating to networking, encapsulation would be the method of storing and converting data through one protocol into another, so that the data can proceed over a network. A TCP/IP package contained under an ATM system, for example, is indeed a kind of encapsulation.

Therefore, Encapsulation is the right answer.

4 0
4 years ago
Your company shares a building with a competitor’s branch office. Recently, you noticed that some computers other than company c
ki77a [65]

Answer:

Disable SSID Brodcasting, Lower Radio Power Levels, Enable MAC Filtering

3 0
3 years ago
HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HEL
AURORKA [14]

Answer:

I should be C! :D

5 0
3 years ago
Read 2 more answers
Other questions:
  • Please help!
    10·1 answer
  • The IBM 370 mainframe computer was introduced in 1970. The 370 Model 145 could hold up to 524,288 bytes of data (512 Kbytes). It
    8·1 answer
  • A ________ describes the data and relationships that will be stored in a database.
    10·1 answer
  • This folder is ndownload and it isn't like download file
    14·1 answer
  • We all had the unfortunate experience of seeing how computers can, at times, make life's journey about more difficult. This is e
    13·1 answer
  • TRY IT Choose the Right Technology MP3 player Widescreen laptop computer Smartphone Tablet computer with wireless Internet Suppo
    8·2 answers
  • Which of the following is the correct financial function that returns the periodic payment for a loan?
    10·1 answer
  • Pls help I will give points
    11·1 answer
  • When creating a storyboard, in which section do you mention how you move from one shot to the next?
    8·1 answer
  • The user can close all the programs if he closes the open virtual desktop true false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!