1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nimfa-mama [501]
3 years ago
11

PLS ANSWER. MARKING CORRECT ANSWER AS BRAINLIEST

Computers and Technology
1 answer:
nikitadnepr [17]3 years ago
3 0

Answer:

E. Purchase the domain name

Explanation:

I majored in Computers

You might be interested in
Write a method that draws a circle and a square that is centered in a DrawingPanel. The method will take in the width and height
Katarina [22]

Answer:

public static void drawGraphics (Graphics g, int width, int height) {

   int r = Math.round(width/2);

   int x = 45;

   int y = 30;

     g.setColor(Color.RED);

   g.fillRect(x, y, width, height);

   g.setColor(Color.BLUE);

   g.fillOval(Math.round(x/2), Math.round(y/2), r, r);

}

Explanation:

The Java method "drawGraphics" of the Graphics class accepts draws a square with the "fillRect()" method of the Graphics class object and at its center, a circular path is drawn as well.

3 0
3 years ago
What is the common name of computers connected in a network?
ser-zykov [4K]

Answer:

Nodes

Explanation

All of the computers and printers on the network are called nodes of the network

6 0
3 years ago
Why do wireless networks experience such a great reduction in actual throughput compared with their respective theoretical throu
jasenka [17]

Wireless networks experience such a great reduction in actual throughput compared with their respective theoretical throughputs, because wireless networks experience a high number of collisions and require greater overhead on each transmission. The throughput varies significantly from the theoretical maximum speeds due to:

distance from the access point, physical obstructions, such as walls, signal-blocking or reflecting materials which affect signal propagation and reduce speed , interference - other wireless networks and devices in the same frequency in the same area affect performance and shared bandwidth - available bandwidth is shared between all users on the same wireless network.


5 0
3 years ago
There are three types of operators in BASIC-256 <br>a) True b) False​
Anestetic [448]

Answer:

a)True is the answer......

6 0
3 years ago
Choose the type of attack that is based on entering fake information into a target network domain name server?
SSSSS [86.1K]

Answer:

DNS poisoning

Explanation:

DNS is a server service that verifies or resolves an IP address to a site or domain name. It's services is made available with a dhcp request from a client system, providing the ip address of the DNS server. The DNS server has the records of domain name linked to their individual ip addresses.

When an attacker wants a client to visit his site without knowing the site is not genuine, he gains access to the dns server and changes the information or poisons the entries of the server. So if the client tries to access that site, it takes him to the attackers site. This is called DNS poisoning.

4 0
3 years ago
Other questions:
  • Which of the following would an interactive media proffessional must likely need
    9·1 answer
  • Digital Photography Help please
    9·2 answers
  • Which of the following is the definition of Internet Protocol Security ( IPSec)? A remote access client/server protocol. It is a
    13·2 answers
  • Given the macro definition and global declarations shown in the image below, provide answers to the following questions:
    5·1 answer
  • A Gym Masters system programmer has just installed the first Windows Server 2016 sys- tem and now needs to do an initial configu
    13·1 answer
  • Which four of the following hardware components are specifically used to enable networking and are not part of a stand-alone com
    13·2 answers
  • If you have 128 oranges all the same size, color, and weight except one orange is heavier than the rest. Write down a C++ Code/A
    7·1 answer
  • Which of the following is an advantage of computer usage? *
    10·1 answer
  • Which retouching action is unethical?
    8·1 answer
  • Program a substitution cipher in Python. Create 2 functions one for encryption and the other for decryption ( get the text as th
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!