1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
monitta
3 years ago
8

I need help with these 2 questions

SAT
1 answer:
Marta_Voda [28]3 years ago
7 0

Answer:

The first one is D the second one is false.

You might be interested in
Sword is mightier than pen explain the message briefly brainly.
QveST [7]

Answer:

"The pen is mightier than the sword" is a saying that many people learn as children. Of course, it means that ideas that are expressed in writing can be much more consequential than violence. Words can influence and inspire countless people, and they can live on indefinitely.

Explanation:

3 0
2 years ago
Two sustainable ways in which businesses could assist school leavers
Kipish [7]

Answer:

businesses could provide internships for them or prep them for getting a job in the real world.

Explanation:

mr clean

3 0
2 years ago
Which statement best conveys how the author's viewpoint changes in the passage.
fiasKO [112]

Answer: His ability to describe the river with precise language improves as he gains more skills in steamboating . 

Explanation:

8 0
2 years ago
What is the polynomial function of lowest degree with lead coefficient 1 and roots 1 and 1 i? f(x) = x2 – 2x 2 f(x) = x3 – x2 4x
QveST [7]
I really don’t know shoddy kidneys wjaolsd
7 0
3 years ago
Which two items do you need to access a shared resource
Degger [83]

The two (2) items which an end user would need to access a shared resource are: authentication and permissions.

<h3>What is ESP?</h3>

ESP is an abbreviation for encapsulating security payload (ESP) protocol and it can be defined as a standard protocol that is designed and developed to provide secrecy for the data (contents or resources) that are transmitted through network communications, as well as system-to-system authentication and data integrity verification so as to prevent any unauthorized access.

In Computer technology, the encapsulating security payload (ESP) protocol is a transport layer protocol which is designed and developed to provide data authentication, confidentiality, and integrity in IPv6 and IPv4 protocols.

In this context, we can infer and logically deduce that the two (2) items which an end user would need to access a shared resource are

  • Authentication
  • Permissions.

Read more on data authentication here: brainly.com/question/14699348

#SPJ1

Complete Question:

Which two items do you need to access a shared resource?

ipconfig and nslookup

DNS and icons

Authentication and permissions

Name and IP address

6 0
2 years ago
Other questions:
  • Which of the following facts are NOT true about dichotomous keys?
    5·1 answer
  • What is a few sentances with words eaves and legacy.
    6·1 answer
  • 8.
    5·1 answer
  • Question 2 of 10
    6·2 answers
  • No se tomar fotos en español​
    7·1 answer
  • Please help due today
    8·2 answers
  • if you were given the chance to write this speech with both aquino and locsin, what issues in 1986 would you like to address wit
    12·1 answer
  • Jeffrey purchased a card for $180.
    11·1 answer
  • Based on paragraph 3 ("in a different. . . Augustine"), what can most reasonably be inferred about augustine?
    11·1 answer
  • What do little piggies do as soon as they get home from school
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!