1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gwar [14]
3 years ago
10

Page No

Computers and Technology
1 answer:
ratelena [41]3 years ago
5 0

Answer:

ila bgfffsg hqhffa hhfw ygga gha yqvvty1uh' fttyavt h5tfauv gtta76rq

You might be interested in
I WILL GIVS BRAINLIEST IF U ANSWER THIS
tatuchka [14]

Answer:

  1. Use Make or Shell as a build tool
  2. Use an IDE as a build tool
  3. Terminate an AWS instance
  4. Test on something you care about
  5. Seek absolute data integrity
  6. Put code in your HTML or HTML in your code
  7. Use the almighty list
  8. I <3 inheritance
  9. I <3 functional
  10. I <3 global
  11. Use big mega-objects
  12. Death by a thousand objects
  13. I can haz threading?
  14. Use of row locks
  15. Use of sequences

Explanation:

5 0
3 years ago
How many bytes are in a megabyte?
Ivenika [448]
1,000,000 bytes are in 1 megabyte.
4 0
3 years ago
Read 2 more answers
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
bonufazy [111]

Answer:

Option (B) is the correct answer of this question.

Explanation:

Packet analyzer is a software application or set of infrastructure capable of unencrypted and recording communication that travels through a virtual system of a computer system.A packet analyzer used to detect network activity is recognized as a broadband monitoring system.

A packet analyzer is a code application that is used for monitoring, intercepting, and recording http requests with the help of a virtual interface.

Other options are incorrect because they are not related to the given scenario.

8 0
4 years ago
What is the most consistent item regardless of the software used in BI?
vodomira [7]

Answer Explanation:

Business intelligence is defined as the strategies and technologies used by companies for the data analysis of business information it tell us also about predictive views of business operation.

THE MOST CONSISTENT ITEMS REGARDLESS OF SOFTWARE USED IN BI ARE :

  • data analyst has the most responsibility of BI he is the most important part of BI
  • It is the interconnected process of inspection changing and modeling
  • data analysis is hugely aided by data mining
5 0
3 years ago
An end-user device requires a specific IP address every time it connects to the corporate network. However, corporate policy doe
sesenic [268]

Answer:

DHCP reservation  is the correct answer.

Explanation:

It is the Internet Protocol assignment which is not temporary. It is the particular address of the Internet Protocol within a DHCP set, which is not temporarily assigned to a particular DHCP client for lease use.

So, the device of the last user required the address of the Internet Protocol whenever they linked to the company's server. The following reservation provides the permission to use static addresses of the Internet Protocol without affecting the company's server.

6 0
3 years ago
Other questions:
  • The problem solving process begins by first ______ the problem.
    11·1 answer
  • A foreign country attempting to access government networks in order to disable a national power grid would be an example of: Sel
    7·2 answers
  • ______ is the software that blocks a user from being able to access your computer.
    9·1 answer
  • He has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, ta
    8·1 answer
  • If an occupation is projected to decline by 7% over the next 10 years, how would you rate the job outlook?
    15·1 answer
  • Maggie is preparing a document.she wants to open the help menu to sort out a formatting problem.which key should she press to op
    15·2 answers
  • Which of the following actions has no impact on your credit score
    9·1 answer
  • What is the general term for programs used to operate a computer
    15·1 answer
  • HELP ME ILL GIVE BRAINLY Input 50 numbers and then output the average of the negative numbers only. Write in pseudocode!
    11·1 answer
  • What should you implement to leverage power, cooling, and networking capabilities independent from other datacenters in a region
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!