1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nexus9112 [7]
3 years ago
10

Who knows me better?

Computers and Technology
2 answers:
Veronika [31]3 years ago
6 0

Answer:

Reading? 14 Sep 23 2006 Red

Explanation:

kap26 [50]3 years ago
4 0
Draw?
Hm 11?
December 30th?
Blue?
You might be interested in
You are a running cable in a new network. You are running a series of cables from the wiring closet to the RJ-45 ports for the c
siniylev [52]

Answer:

IDF cable

Explanation:

An IDF cable or intermediate distribution frame is a cable rack that interconnects and manages a MDF or main distribution frame and a collection of workstations or computer systems. The MDF is a cable rack that interconnects several IDFs to itself.

4 0
3 years ago
5. The best way to clear your Reader is to
Fantom [35]

Answer:

Mark all posts as read

Explanation:

I've did it before

7 0
4 years ago
Read 2 more answers
Which of the following is a domestic business activity?
harkovskaia [24]
What are the options?

7 0
3 years ago
Read 2 more answers
Which of the example DFSs discussed in this chapter would handle a large, multiclient database application most efficiently? Exp
Tju [1.3M]

Answer: A.F.S- known as Andrew File System.

Explanation:

This is a distributed network file system created to handle large multiclient database. It support Information sharing on a large scale by reducing client-server communication.

3 0
3 years ago
Technologies that function within the established system are called
vesna_86 [32]
<span>Authorizing technologies are technologies that controls the use of system and network resources through authentication and authorization. 
</span><span>Enabling technologies are innovation technologies that drive radical change in the capabilities of a user or culture.
</span>Obstructing technologies include blocking<span> and filtering, content manipulation, attacks.
</span>Preemption means "prior seizure of" and preemptive technologies <span>take control of the operating system from one task and giving </span>it<span> to another task.
</span><span>Technologies that function within the established system are called enabling technologies.</span>
8 0
3 years ago
Other questions:
  • To use an imported image, simply drag it from the desktop onto the stage. true or false?
    14·1 answer
  • Which one is a run-on sentence? you get mark the brilist
    5·2 answers
  • What is income?
    10·2 answers
  • Write a police description a person who know you well​
    12·1 answer
  • What is the main purpose of a web crawling program
    15·1 answer
  • How does the use of blocking affect the external sorting algorithm, and how does it change the cost formula
    5·1 answer
  • Html is a markup language that lets you identify common sections of a web page
    8·1 answer
  • Is there an air flow through the house? if so, does the air flow in the window and out the chimney, or in the chimney and out th
    8·1 answer
  • suppose a malloc implementation returns 8-byte aligned addresses and uses an explicit free list where the next and previous poin
    6·1 answer
  • try the following code to see a nullpointer error (if you don’t see the error because of the autograding, you can copy it into t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!