1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scrat [10]
3 years ago
7

Which is many many years of vot in nepal.​

Computers and Technology
1 answer:
Butoxors [25]3 years ago
3 0

Answer:

18 yrs

Explanation:

You might be interested in
1.
Alecsey [184]
I think
The start and end shape
7 0
3 years ago
How do unstar another user
Tomtit [17]

Answer:

i dont know

Explanation:

3 0
3 years ago
Which is said to be ‘computer on a chip’ (a) Micro processors (b) Microcontrollers (c) Both (c) None of the above
SIZIF [17.4K]
(C) None of the above
5 0
3 years ago
What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b
Paraphin [41]

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

3 0
3 years ago
What should you do first when designing a program?
Nady [450]

Answer: talk about da progrm

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • What did the use of steam engines in printing presses lead to the development of?
    14·1 answer
  • Pls help me. ask yourself what would jesus do...
    14·1 answer
  • PL Technologies suffered considerable data loss when its database was infected by a virus. George, an operations personnel, atte
    8·1 answer
  • The ____ layer protocols are the rules for implementing end-user services provided by a network. Transport Application Physical
    11·1 answer
  • Which function does the Subtotal feature use?
    5·1 answer
  • How should the teachers respond to the parental complaints of student C? If they fail the student, the student will likely be re
    11·1 answer
  • A worksheet can have a maximum of number of rows​
    11·2 answers
  • 2. 5s is a Chinese principle adapted for use in the workplace.<br>True or False​
    11·1 answer
  • Assembly language program wich indetify largest number from the five elements 51,44,67,30,99​
    13·1 answer
  • What type of degree do web masters tend to have?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!