1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
9

Open excel program then use the (IF) function to fill the column of (Expensive/Cheap) then save your

Computers and Technology
1 answer:
svet-max [94.6K]3 years ago
4 0

Answer:

(7,6)12>34=Mc²

Explanation:

AB

MA

B

F

с

AAB=BC,AM=MC

BM IAC , EF I BC

You might be interested in
Application partitioning gives developers the opportunity to write application code that can later be placed on either a client
Hunter-Best [27]

Answer:

True

Explanation:

Application partitioning is defined as the process by which pieces of application codes are assigned to servers or clients. it provides a description of the processes involved when developing applications that requires distribution of the application logic among more than one computer in a network. It provides developers the opportunity to write application codes capable of being placed on a later time on a server or client workstation. The decision is dependent on the location capable of bringing the best performance.

8 0
3 years ago
_______ view focuses on the text and content of a document, without much information on the page layout.
Jlenok [28]
D is the mode in witch only or mostly text is visible.<span />
6 0
3 years ago
Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with
Shtirlitz [24]

Answer:

Explanation:

From the given information;

We will like you to understand that the source port numbers and destination port number can be any number. For that reason, the ones being used here will just be examples.

NOTE:

That the destination port numbers sent from A to S and B to S are the same in their segments.

That the destination port numbers sent from S to A and S to B are the same in their segments.

From A to S, the segment sent possibly could have the source port number 467 and destination port number as 23(Telnet)

From B to S, the segment sent possibly could have the source port number 513 and destination port number as 23(Telnet).

From S to A, the segment sent possibly could have the source port number as 23(Telnet) and destination port number as 467.

From S to B, the segment sent possibly could have the source port number as 23(Telnet) and destination port number as 513.

Yes, it is possible. This is because the inclusion of  IP in the segments is to recognize the host.

No, the source ports will be different. Because source port number from A to S can't be the same from B to S at the time they are in the same host.

7 0
3 years ago
question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
erma4kov [3.2K]

The correct answer is MAC (Media Access Control).

<h3>What is MAC?</h3>

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

brainly.com/question/29388563

#SPJ1

6 0
1 year ago
Question 1
likoan [24]

Answer:

No Answer by by a third jsjshs

7 0
2 years ago
Other questions:
  • You have received several trouble tickets from the employees in the warehouse for the stand-alone computers used to control vari
    14·1 answer
  • How do solar cells translate heat energy into mechanical energy
    13·1 answer
  • Co to jest podprogram (procedura lub funkcja)? Zaznacz poprawną odpowiedź. a) Wielokrotne powtarzanie tych samych poleceń. b) Wy
    8·1 answer
  • Counter-controlled repetition is also known as:
    8·1 answer
  • Write a Comparator that compares String objects by the number of words they contain. Consider any nonwhitespace string of charac
    15·1 answer
  • What major criteria must a product or process meet in order to be considered emerging technology?
    6·1 answer
  • A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate
    5·2 answers
  • Create a file named homework_instructions.txt using VI editor and type in it all the submission instructions from page1 of this
    7·1 answer
  • In a selection, the else clause executes ______________. a. always b. when the tested condition is false c. when the tested cond
    6·1 answer
  • Which of the following is the key business objective behind the technologies implemented by PCL Construction, as discussed in th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!