1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
8

Core to resource management system is the _________that coordinates the server hardware.

Computers and Technology
1 answer:
vichka [17]3 years ago
5 0
Hehdhdjdjddjdjid iridium chi jo j o j o j o j
You might be interested in
Which of the following file formats is used for art work
Dovator [93]
JPEG. It's most used for art. And PNG is used mostly in websites because it is non-lose compression.
4 0
4 years ago
Sorts by value in reverse order; keeps the same key
KATRIN_1 [288]

Answer:

rsort()

Explanation:

the sorting function is used to sort the elements in the array.

the sorting can be increasing or decreasing, depends on the function used.

let discuss the option:

a. sort()

this is the sorting function, it used to sort the array in ascending order.

b. arsort()

this is also sorting function, it used to sort the associated array in descending order according to the value.

d. asort()

this is also sorting function, it used to sort the associated array in ascending order according to the value.

c. rsort()

this is the sorting function, it used to sort the array in descending order.

Therefore, the correct answer is rsort().

4 0
3 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the
il63 [147K]

The information that would be the next to be processed by the receiving device is: IP at the internet layer.

<h3>Internet protocol (IP)</h3>

Internet protocol is a network protocol that help to transmit data to user device across the internet or network which inturn make it possible for user device to connect and communicate over the network.

Internet protocol at the internet layer is a TCP/IP software protocol which sole purpose is to transfer data packets across the internet after receiving and processing the data.

Inconclusion the information that would be the next to be processed by the receiving device is: IP at the internet layer.

Learn more about internet protocol here:brainly.com/question/17820678

7 0
2 years ago
How do you ask brainy a question without it not liking the question and saying it hurts their feelings?
murzikaleks [220]
IM SORRY but i dont now your question

7 0
3 years ago
Other questions:
  • Online retailer Amazon relies heavily on a hierarchy culture to manage its vast and complex shipping processes. ___________ are
    11·1 answer
  • Given the following HTML form snippet of markup, which of the following user inputs would meet the regular expression rule writt
    7·1 answer
  • ​what is the best advice to follow when using texting or instant messaging (im) in the workplace
    5·1 answer
  • Provide an example of making multiple paragraphs tags using html and at least 3 sentences.
    13·1 answer
  • XML Schemas consist of:
    15·1 answer
  • Devon keeps his commitments, submits work when it's due, and shows up when scheduled. What personal skill does Devon
    15·2 answers
  • C++ please
    8·1 answer
  • What does the digital living network alliance standardize
    12·1 answer
  • Question 1
    10·2 answers
  • In java language I want the code
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!