1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ch4aika [34]
2 years ago
11

Edhesive 9.3 code practice

Computers and Technology
1 answer:
matrenka [14]2 years ago
6 0

So your parent hasn't joined you on the Brainly express to Achievement-ville. We'll get them on board. Parents are busy people, but you can be the boss and remind them. Remind them how Brainly boosts you with expert knowledge. Remind them that tons of students already get grade upgrades with Brainly Plus. Remind your parent of the power they have to raise you to your full potential. We think they would agree. You deserve every education advantage.

You might be interested in
Can include the 5-tuple information, which is the source and destination ip addresses, source and destination ports, protocols i
Delicious77 [7]

<span>The answer is Firewall Log.  The </span>Logging tab is a tabled, real-time and up-to-date integration of the traffic logs generated by the Firewall. It will show all the connections that have been active on your computer.  <span>You can also use the Windows Firewall log file to monitor TCP and UDP connections and packets that are blocked by the firewall.</span>

7 0
3 years ago
The SETI (Search for Extraterrestrial Intelligence) project collected vast amounts of data that needed processing. SETI was one
I am Lyosha [343]

Answer:

grid computing

Explanation:

Based on the information provided within the question it can be said that this technology is typically known as grid computing. Like mentioned in the question, this is a type of processor architecture in which various computer resources are combines from different domains in order to work together towards a common main objective. Which is exactly what SETI has done by using many individual's computers to essentially create one supercomputer capable of handling all the data.

6 0
3 years ago
Which of the following describes the term "false information?"
pav-90 [236]
Inaccurate and misleading
3 0
3 years ago
What is most important for you to choose before you build a network?
lbvjy [14]

i'm needing help with the same question but mine gave choices, could you help please? thanks

A.  

private network

B.  

NOS

C.  

network media

D.  

network protocol

E.  

directory service

3 0
3 years ago
When you are saving a file, what does word suggest by default as the name of the document?
LenaWriter [7]
Whatever you have written on the page is what it'll name it.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • How can we set the color of a text that acts as a link in a web page​
    10·2 answers
  • Esther has acquired an associate's degree in information technology and certifications in PageMaker and Illustrator. Which caree
    8·2 answers
  • A(n ____ is anything about which data are to be collected and stored.
    8·1 answer
  • When creating a presentation you should use a blank as a starting point?
    15·1 answer
  • What allows users to connect via the Internet to its private network?
    11·2 answers
  • Which programming element is used by a game program to track and display score information?
    10·2 answers
  • What are 25 items that trees made?
    6·2 answers
  • If tech is smarter than us. How did a human make something smarter than him/her?
    9·2 answers
  • Look at the code in the example below, and then answer the question.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!