1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natita [175]
3 years ago
8

HAve a good week lads, good luck on work :D

Computers and Technology
2 answers:
Leno4ka [110]3 years ago
8 0

Answer:

v; its alright.

Explanation: none v;

Andrej [43]3 years ago
8 0

Answer:

life is ok ig

Explanation:

i need sum one to talk to

You might be interested in
Which of the following is a list of input devices?
charle [14.2K]
The Correct answer would be C. <span>microphone,mouse,scanner

microphone you talk into to give info (data)

a mouse you use to click on objects  to give input 

a scanner you input a paper/object 

hope this helps!! :)


</span>
7 0
3 years ago
What feature did the 32X add to the Sega Genesis?
il63 [147K]

Answer:

ngl why would i know this

Explanation:

5 0
3 years ago
does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?
Kryger [21]

The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

<h3>What is the access control list?</h3>

An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.

Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Learn more about the access control list here:

brainly.com/question/13718195

#SPJ4

5 0
1 year ago
List the correct order of steps necessary to using usmt to migrate files from an old computer to a new computer.
dlinn [17]
The USMT (User State Migration Tool) is designed to assist IT professional migrate files to the windows OS. An example is a step by step migration of files and settings from a windows XP environment to windows 8 using USMT. At the end of the day, you will have used LoadState a ScanState to complete this end to end migration. The correct order is as follows; <span><span>


1.      </span>Gather Data Using the ScanState Tool</span>

<span>a)      </span>Install USMT

<span>b)      </span>Run ScanState to Create a Migration Store on the Server

<span>2.       </span>Install Windows

<span>a)      </span>Install Applications

<span>3.       </span>Apply Data Using the LoadState Tool

<span>a)      </span>Install the USMT

<span>b)     </span> Run LoadState






8 0
3 years ago
I need help ASAP please
Sunny_sXe [5.5K]

Answer:

The best way is 2 and the worst is 1

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Discuss the differences between dimensionality reduction based on aggregation and dimensionality reduction based on techniques su
    13·1 answer
  • Why is there a need to compare and align one's PECs of a successful entrepreneur?
    5·1 answer
  • Using Task Manager, you discover an unwanted program that is launched at startup.
    13·1 answer
  • What port does rdp use by default and from what range of numbers should you select a private port number?
    15·1 answer
  • Which is a benefit of getting information from a government website?
    15·2 answers
  • How old was the mummy where they found a wooden prosthetic toe on him?
    6·1 answer
  • My feelings alwayss T-T
    14·2 answers
  • 3. State whether the given statements are true or false. a. The computer is called a data processor because it can store, proces
    13·1 answer
  • What is sampling?
    6·1 answer
  • Write about virus in five points.​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!