1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bogdan [553]
3 years ago
5

dash is a set of communication standard using for transferring file information between computers in a network​

Computers and Technology
1 answer:
8090 [49]3 years ago
4 0

Answer:

protocol

Explanation:

hope this helps.

You might be interested in
Is there an ethically acceptable reason to study and use the various attack methods described in this chapter? Can you think of
avanturin [10]

Answer:

Please see below  

Explanation:

Yes, there indeed is ethical justification for hacking certain computer systems. Since computer scientists are required to keep the system secure from external threats, so they make use of it when testing the network for potential loopholes that could make it vulnerable. It is beneficial in that it can help manifest the weaknesses present in the system, which can then be corrected for.

6 0
3 years ago
Dеclarе and allocatе mеmory (on thе hеap) for a onе-dimеnsional array of 256 doublеs namеd pricеs
Zigmanuir [339]

Answer:

double *prices=new double [256];

Explanation:

To allocate memory on heap we use new keyword.In the above statement an array name prices is declared and the memory allocated to it is on the heap memory.

First look at double * prices.It is a pointer this pointer is created on the stack memory which holds starting address of the array present on the heap memory of size 256..

4 0
3 years ago
(tco 8) when asp.net receives a request for an application that uses forms-based authentication from a user who hasn't been auth
leonid [27]
Hi,

This what you are looking for: "records incorrect prompt"

Hope this helps.
r3t40
7 0
3 years ago
to verify that the ip address sorting criteria that has not been configured to overlap between different groups you can use the
blsea [12.9K]

For one to be able to verify that the ip address sorting criteria that has not been configured to overlap between different groups you can use the check IP group - testing.

<h3>What does IP group do?</h3>

The term IP Group is known to be one that looks at or is one whose purpose is so that it can  generate  a lot of a positive social and also that of environmental impact with financial returns.

Note that this is one that offers shareholders a kind of an exposure to a a lot of portfolio of opportunities that is made up of a  high-growth businesses in regards to the growth markets.

Hence, For one to be able to verify that the ip address sorting criteria that has not been configured to overlap between different groups you can use the check IP group - testing.

Learn more about IP address from

brainly.com/question/24930846

#SPJ1

7 0
2 years ago
A user contacted you to report that an unwanted Windows application is launched each time her computer is booted. How can you pe
nikklg [1K]

Answer:

Uninstall the application.

Explanation:

When a program or a computer application constantly launches by itself each time your system is booted, the best and most effective solution is to uninstall the application.

Uninstalling an application entails removing the application entirely from your device.

3 0
3 years ago
Other questions:
  • How can i put this sign in my keybord?<br><br> :::::<br> ^<br> Here is the sign
    8·1 answer
  • Which of the following statements are true about the Internet?
    14·1 answer
  • The tone a writer takes is referred to as the writing _____.
    7·2 answers
  • Which button is used to open the Start menu in Windows Vista?
    14·1 answer
  • Why would advertising be more important in a magazine publishing than it is in a newspaper?
    14·2 answers
  • What type of engineer is interested in designing, developing, and building different machines, devices, and tools? A.aerospace
    8·2 answers
  • Describe how a computer checks whether the image just taken by the camera matches the scanned photograph.
    12·1 answer
  • Which statement is true regarding Artificial Intelligence (AI)?
    13·1 answer
  • Evaluate and compare free and commercial versions of the Avast antivirus software
    6·1 answer
  • Why should we learn Ethereum? Explain.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!