1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
3 years ago
9

Task 1

Computers and Technology
1 answer:
EleoNora [17]3 years ago
5 0

Answer: yes they do

Explanation: they both show the same references.

You might be interested in
​​most code division multiple access (cdma) networks conform to ____________ , created by the telecommunications industry associ
Lyrx [107]
The answer is <span>IS-95.  M</span><span>ost Code Division Multiple Access (CDMA) networks conform to IS-95, created by the Telecommunications Industry Association (TIA).  I</span><span>nterim Standard </span>95<span> (</span>IS-95<span>) was the first ever CDMA-based digital cellular technology, developed by Qualcomm and later adopted as a standard by the Telecommunications Industry Association (TIA).</span>
3 0
4 years ago
What command enables you to initialize quotas on a file system?
jeka57 [31]
 Quotas can be enabled by mounting a partition with the usrquota (and optionally the grpquota) mount option(s).Normally this is done by editing /etc/fstab and adding usrquota to the mount options part of the entry for some filesystem.Then that <span>filesystem must be remounted ("mount -o remount filesystem").</span>
4 0
3 years ago
When enabling IPsec mobile client support, you made some selections in the Xauth section of the interface. What does Xauth stand
konstantin123 [22]

Answer:

Extended authentication

Explanation:

Xauth = Extended authentication

An extended authentication can cause security to be increased because it requires the user to enter a username and password. These details would then be authenticated at the internal database of the controller. This extension is an ipsec extension which would enable VPN users to enter a username and password. These details would be required of the user while trying to connect and they would be checked against the login details registered by such a user.

4 0
4 years ago
BRAINLYEST IF CORRECT!!! What is the special feature of the View Side by Side command?
xeze [42]

<u> Allows you to see two parts of the same worksheet side by side</u>

<u>Option: B</u>

<u>Explanation:</u>

The View Side by Side command helps to see the two documents side by side in Word. When using this feature, both the documents open at the same time in different windows side by side.

To view this, click the View tab in Word and then click the View side by side button. Now the document opens in two windows with side by side views. This is used to compare the documents. In case, if we want to disable this view, click the 'View Side by Side' button again so that it comes to the normal view.

6 0
3 years ago
Read 2 more answers
Describe a situation when you would use a conditional statement in a program. Describe the action that would occur when the cond
kramer

Answer:  Conditional statements are just true false statements

Explanation:

Let's say there's a kpop band burglarizing my house and I have a super AI that detects if a kpop band is my house through cameras. What it would do is change a variable "kpopBandInHouse = False" to True. I would then have an if statement next with a custom function:

if kpopBandInHouse == True:

   nukeHouse()

So if the conditional statement is true, it nukes my house. It is false, it does not nuke my house.

7 0
3 years ago
Other questions:
  • What are three settings that are available in the Properties dialog box of a message?
    9·2 answers
  • Liam is a hacker who tries to access Wi-Fi signals while driving his car. What type of wireless network attack is this?
    9·1 answer
  • The following pseudocode is an example of ____.do stepAdo stepBif conditionC is true thendo stepDelsedo stepEendifwhile conditio
    15·1 answer
  • B.
    12·1 answer
  • ICD-10-CM diagnosis codes are entered in Block 21 of the CMS-1500 claim. A maximum of __________ ICD-10- CM codes may be entered
    14·1 answer
  • What function key is used to enable the spelling and grammar function
    14·1 answer
  • Focusing on a target market makes it harder to develop products and services that specific groups of customers want.
    10·1 answer
  • I want to make a game with a friend. I use visual studio code. How do I work on the game with him? Like can he edit the same tim
    10·1 answer
  • Select the items below that are examples of things that could use the smart card technology.
    7·1 answer
  • Differentiate between Computer Science and Information Technology
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!