1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkinab [10]
3 years ago
5

3.4.6 colorful bracelet ?

Computers and Technology
1 answer:
e-lub [12.9K]3 years ago
5 0

Answer:

yes, 12x6z

Explanation:

i did it on my workbook

You might be interested in
pen the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which event will take place if
zysi [14]

Answer:

Packets with unknown source addresses will be dropped.

Explanation:

This question is incomplete, we must add the number "1" in Fa0/1.

Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

There are four options:

- A notification is sent.

- A syslog message is logged.

-The interface will go into error-disabled state.

- Packets with unknown source addresses will be dropped.

In this specific example, we have configured a security protection mode, if there is an unknown MAC address,  every package will be dropped.

We can configure in our switch with different Mac address, if there is not a MAC address in our configuration, the security mode will active, and we could receive any package.

5 0
4 years ago
The documents created in ms-excel is call what?​
rosijanka [135]

Answer:

It is called a Spreadsheet

5 0
3 years ago
Read 2 more answers
Describe the three-schema architecture. Why do we need mappings among schema levels? How do different schema definition language
VARVARA [1.3K]

Answer:

Three Scheme architecture contains internal level, conceptual level, and external level.

In the internal level physical structure of the database described. The internal Schema is also known as physical Schema, as it is used to define the data that stored in a block. Internal Schema describes a sophisticated level of data structure in detail.

The conceptual level design of the database has described, and it is known as a logical level. The conceptual level describes the whole structure of the database. It describes the relationships among the data. Implementation of data are hidden in a theoretical level

On the external level, databases contain schemas that represent a different view of the database. Each describes the database that the user interested in and hides the remaining database. The external database is also known as view schema.

Explanation:

The mappings between schema levels happen due to visualization and schema matching. DBMS has three schema level.

In the attached diagram

It shows the DBMS architecture.

Mapping is a way to transfer and respond to the request between the various database architecture.

Mapping takes more time to transfer data in small DBMS.

External / Conceptual mapping transforms the data from the outer level to the conceptual schema.

In Conceptual / Internal mapping, response transforms from conceptual to internal level.

Document Schema Definition Language (DSDL) is a framework in which multiple validations can be applied to achieve a complete validation result. In this way, schema definition language support this architecture.

8 0
3 years ago
Hannah dakota's experiment obtained reaction time data using a factorial design with two independent variables. she should use a
Verdich [7]
Hannah dakota's experiment obtained reaction time data using a factorial design with two independent variables. she should use a Two-way ANOVA to evaluate her data.  <span>The two independent variables in a two-way ANOVA are called factors. The idea is that there are two variables, factors, which affect the dependent variable.</span>
5 0
3 years ago
What citation style should I use if applying for a government job?
maw [93]
You should always cite your sources with a referral to the person.
3 0
3 years ago
Other questions:
  • Alcohol is considered a _____ drug
    5·2 answers
  • HELP NOW PLZZ/ Question: Complete the sentence with the correct response.
    11·1 answer
  • To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual
    9·1 answer
  • It is ok to sell services on Xbox in exchange for real-world money
    10·2 answers
  • Give an O(log m + log n)-time algorithm that takes two sorted lists of sizes m and n, respectively, as input and returns the ith
    7·1 answer
  • Where (what memory location) is the data read from for the following code:
    12·1 answer
  • In mathematics, the notation n! represents the factorial of the nonnegative integer n. The factorial of n is the product of all
    7·1 answer
  • In which circumstances would the view side by side feature be useful or helpful.
    15·2 answers
  • Multiple Intelligence Theory explains that...
    8·2 answers
  • Anyone who know hacking​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!