1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ch4aika [34]
3 years ago
6

There is a feature that allows you to lock the document, to avoid others making changes. True or False

Computers and Technology
1 answer:
Burka [1]3 years ago
6 0

Answer:

yes there is

Explanation:

You might be interested in
The dns server translates the URL into the IP address 8.8.8.8. What is the next step in the process?
geniusboy [140]

Answer:

The web browser sends an HTTP request to the IP address, the IP address then sends the content that are displayed by the browser

Explanation:

The process of converting the typed in URL to a displayed page is as follows;

1) The typed in URL is sent to a DNS recursor by the browser

2) The recursor gets the DNS record for the domain from the cache if the record is cached or when the DNS record for the domain is not cached, the recursor makes a requests to the DNS root from which the name of the TLD nameserver is received

3) The TLD nameserver is contacted by the resolver to obtain the authoritative nameserver's IP address

4) With the information, the resolver contacts the authoritative nameserver and obtains the domain's IP address for the domain the resolver contacts

5) The obtained IP address for the URL's domain is then sent to the browser by the resolver

6) An HTTP request is sent by the browser to the IP address and the data received by the browser from that IP address is rendered and seen as the page content.

6 0
2 years ago
Maxwell says three things Level Two Leaders do well are:
IRINA_888 [86]

Answer:

true

Explanation:

3 0
3 years ago
A(n) ____ , a type of idps that is similar to the nidps, reviews the log files generated by servers, network devices, and even o
kobusy [5.1K]
An LFM IDPS

Using an LFM which stands for log file monitor, the system is able to review log files generated by servers, network devices, and even other idpss. Its main purpose is to look for signatures and patterns which might indicate that an intrusion is in the pipeline or has already happened.
This intrusion detection is enhanced due to the fact that LFM is in a position to look at several log files from different systems.




8 0
2 years ago
Como se juega robótica de cokitos
Anton [14]

Answer:

No sé.

Explanation:

Especifica más.

4 0
2 years ago
To get a page from the Web, a user must type in a URL, which stands for: a. Unknown Resource Locator b. Unknown Router Location
Afina-wow [57]

Answer:

Hey! The answer you're looking for is D. Uniform Resource Locator.

3 0
3 years ago
Other questions:
  • What does CPL stand for
    9·2 answers
  • What is 1-7? Plz help!!!
    15·1 answer
  • It will gain you more knowledge, intensify your soft skills, strong work ethics and grow your network. What is it?​
    12·2 answers
  • Which of the following function headings arevalid? If they are invalid, explain why.
    12·1 answer
  • What answer best explains why improper netiquette is considered dangerous? Individuals who violate user policies are often charg
    14·2 answers
  • What will save you the most money when trying to reduce the cost of college
    5·2 answers
  • Caroline is building an expert system for wartime defense. Which of these is true about the system she is building?
    14·1 answer
  • How can learning opportunities for AI be extended to all
    6·1 answer
  • a customer is looking for efficient alert management for its Data centre operations for reducing human effort in monitoring and
    15·1 answer
  • Beginning in cell B21, complete the series of substitution values ranging from $35 to $45 in increments of $2.50 vertically down
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!