1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8_murik_8 [283]
2 years ago
5

That’s what I have so far. I need help!

Computers and Technology
1 answer:
olga2289 [7]2 years ago
5 0

Answer:

Are you trying to hack well if you are message me I'm a good hacker

Explanation:

You might be interested in
What is a computer network?
Contact [7]

Answer:

A computer network is a group of two or more computers that are linked together. Networks are usually used to share resources, exchange files or communicate with other users. so A

Explanation:

7 0
2 years ago
What technology allows you to hide the private IP address of a system from the Internet?a. SSLb. RADIUSc. PPTPd. NAT
Greeley [361]

Answer:

The answer is "Option d".

Explanation:

In networking, NAT refers to the Network Address Translation. This process is used to translate computer IP addresses into a single IP address in your local network. It allows private IP networks to connect to the Internet using unregistered IP addresses. and other options are incorrect that can be described as follows:

  • In option a, SSL stands for Secure Sockets Layer. It is used in transmission of documents or data over a network that's why it is not correct.
  • In option b, RADIUS stands for Remote Authentication Dial-In User Service. It is used to manage the data on a network.
  • In option c, PPTP stands for Point-to-Point Tunneling Protocol. It is used to provide a set of rules for communicating through a network that's why it is not correct.

6 0
3 years ago
The security administrator for Corp wants to provide wireless access for employees as well as guests. Multiple wireless access p
Artemon [7]
It’s B I took the test
7 0
3 years ago
How to find determinant of ​
babymother [125]
Some proteins must be altered before they become functional.
5 0
3 years ago
When you open your word-processing program, it opens in a<br> field<br> menu
stepan [7]
B- menu...... hope this helps
8 0
3 years ago
Read 2 more answers
Other questions:
  • How to get out of the verify your identity page on a dell laptop because it won’t let me
    13·1 answer
  • VEE Physics 2006 E.C
    7·1 answer
  • Write a program that asks the user to enter a series of single digit numbers with nothing separating them. Read the input as a C
    12·1 answer
  • What is an advantage of storing data in a Data Lake, without applying a specific schema to it initially?
    10·1 answer
  • Lee has changed the style of his table to make the header row stand out. Next, he wants to center the text in the header row and
    11·2 answers
  • Samantha is looking for a lens that is lightweight and small, making it easy to transport. She doesn’t care about the lens being
    5·2 answers
  • A binary search algorithm ____________ an ordered list in<br> half to find an item.
    13·1 answer
  • True or False <br> Hebrew Bible and the Koran were first written in English.
    15·1 answer
  • HELP 100 points
    9·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!