1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
3 years ago
9

Tell the story, step by step, of how your computer finds the CodeHS server,

Computers and Technology
1 answer:
Blababa [14]3 years ago
7 0

Answer:

huh .......................................

Explanation:

You might be interested in
In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow
Sphinxa [80]

Answer:

enable the used ports in the router with their respective IP address and only the connected ports in the switch. Allow configure the STP on the switch

Explanation:

Network switches are used to connect a group of computer devices in a network LAN. It is automatically enabled when a port is connected and creates a MAC address table of the computers connected to it. STP or spanning-tree protocol is a protocol used to prevent looping in a switch. Unused ports can be disabled for security reasons.

A router is a network device that is used to forward packets between networks. All used ports in a router must be enabled and configured with an IP address and subnet mask.

5 0
3 years ago
What is the best method to avoid getting spyware on a machine
monitta

Answer: The best method to avoid getting spyware on a user machine is to download software only from trusted websites. And depending on the machine it might say that "This download you are about to install might have spyware or malware and it might infect your laptop" "Do you wish to continue?"

3 0
2 years ago
How does a Cloud-first strategy differ from other approaches to Cloud?
Brut [27]

Answer:

There is a considerable difference between a cloud-first strategy and other cloud approaches. The developers of the cloud-first strategy are familiar of every data point that requires backup and synchronization. As a result, a lower assembly layout that is more tolerant of database sync is required. In other words, a cloud-first strategy can easily accommodate new technology.

Cloud-first strategy is the current data management method that was not available a few years ago. Such processes and reliability are inapplicable when transferring application software and data to the cloud. You will have to make sacrifices in terms of load balancing and distributed functionality, which will be limited when using other cloud approaches. And this is where Cloud-first strategy shines, as you will be able to control and use all of the host's functionalities.

Explanation:

A cloud-first strategy is one in which all or most of an organization's structure is moved to a cloud-computing environment. Traditionally, organizations required physical supplies to keep their online data; nowadays, they store it on the cloud, which is fundamentally more useful. Cloud-first organizations, regardless of size or importance, are designed to operate their operations on cloud servers. Rather of transferring the organization's data and services to the cloud, adopt a cloud-first strategy and design the application software from the ground up. Not only does the cloud-first strategy outperform traditional application architectures in terms of performance, but it also provides higher stability.

5 0
1 year ago
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption
Darya [45]

Answer:

Hardware security module.

Explanation:

Hardware security module is a Physical digital device that comes as a plug-in adapter used to secure and manage digital keys and provides crypto processing for strong authentication.

It has an onboard cryptographic keyboard and one or more crypto processors, and can be used on computers and network servers to prevent logical or physical authentication access to unauthorized users. It supports symmetric and asymmetric cryptography.

8 0
3 years ago
Which of the following statements is false? A.The concepts of icons, menus and windows were originally developed by Xerox PARC.
Fudgin [204]

Answer:

(b) Windows is an open source operating system (<em>This is not correct</em>)

Explanation:

Option a is <em>correct</em> because Xerox PARC(Palo Alto Research Center), which is a subsidiary of the Xerox corporation, has been greatly responsible for invention and development in modern computing devices. Some of these developments are in Ethernet and graphical user interface (making use of menus, icons e.t.c).

Option b is <em>not correct</em> because Windows Operating system is not an open source operating system. Open source OS means users can interact with the driving code of the OS and make modifications. Windows does not support this feature. Operating systems that are open source include Linux and OpenSolaris.

Option c is <em>correct</em>. An operating system has two main components - the kernel and the user interface. The core component of an operating system is the Kernel as it interacts directly with the hardware and manages system resources. The user interface on the other hand allows users to interact with the kernel of the operating system using texts and/or graphics as commands.

Option d is <em>correct</em>. Linux operating system is an open source OS. Therefore, the source code is made available to the public for examination and modification.

8 0
3 years ago
Other questions:
  • Which of the following is an example of subjunctive verb mood?
    5·1 answer
  • Anna always has a hard time finding files on her computer because she does not know where she saved them. This also affects her
    12·2 answers
  • Why is it a good idea to view your HTML code in more than one web browser
    13·1 answer
  • ​PeroxyChem's IT staff was able to free its IT staff to spend less time on routine maintenance and more time on strategic tasks
    11·1 answer
  • In apersuasive message, opposing ideas should be:
    13·1 answer
  • How do you change the name on your brainly account?
    12·1 answer
  • What is the output of:<br><br> print (8 % 4)
    6·1 answer
  • The Internet is based on a U.S. government project called ________. Today, the Internet is a collection of networks, tied togeth
    5·1 answer
  • When it comes to credit scores, why is having a
    9·1 answer
  • Current flow is the same through all the elements of a series circuit.<br><br> true or false?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!