1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nimfa-mama [501]
3 years ago
5

JKJKNJJNJJJLKN;K;L;LHNL;BJ

Computers and Technology
2 answers:
bezimeni [28]3 years ago
8 0

did you have a stroke bestie?

matrenka [14]3 years ago
7 0
1234567891011121314151617181920
You might be interested in
A software license gives the owner the to use software.
Sveta_85 [38]
Yes, but under the given terms of service
3 0
2 years ago
Read 2 more answers
What does the "configure dhcp options for proxy dhcp" option do?
ZanzabumX [31]
You should select the configure DHCP options for proxy DHCP option if the local DHCP server is a Microsoft DHCP server, if you select this option the DHCP server is automatically configured to forward the PXE requests to the WDS server. If the local DHCP server is not a Microsoft DHCP server, you have to configure the DHCP server manually to forward the request to the WDS server. 
5 0
3 years ago
What happens as the key length increases in an encryption application?
pashok25 [27]
<span>The answer is : Increasing the key length of DES would  protect it against brute force attacks.  </span>Brute force is when the attacker tries every key knowing that one will eventually work.  <span>Key length increase proportionally increases the key space,  having a keyspace l</span>arge enough that it takes too much time and money to accomplish a brute force attack.
6 0
3 years ago
Which step of creating a financial budget involves listing the payroll, rental, and utility costs?
Bingel [31]

Answer:

A. planning and gathering financial information

4 0
3 years ago
Read 2 more answers
Which symbol is at the beginning and end of a multiline comment block? &amp;&amp;&amp; """ %%% ###
yawa3891 [41]

Answer:

#

Explanation:

I have notes on it we learned it in 8th

7 0
3 years ago
Other questions:
  • Chris needs to modify the default bullets that are used in a nonnumbered list in word. Which method should he use?
    9·2 answers
  • Malware that corrupts the target operating system in such a manner that a network defender can no longer trust the native OS is
    15·1 answer
  • In the table below identify the data type that would be most suitable for the second field
    14·1 answer
  • 1. Zack sees an online contest. He could win $10,000 instantly! On the sign-up form, he enters his name and email address. He is
    15·1 answer
  • From the Software Engineering Code of Ethics, which clauses relate to intellectual property (check all that apply)
    15·1 answer
  • Having friends who cause you stress can decrease your happiness, which can in turn
    13·2 answers
  • Write the method addItemToStock to add an item into the grocery stock array. The method will: • Insert the item with itemName ad
    12·1 answer
  • If you want to change the name of a folder that stores Word documents, what should you do before changing the
    15·1 answer
  • How are the waterfall and agile methods of software development similar?
    13·1 answer
  • which filename refers to a 16-bit real-mode program that queries the system for device and configuration data, and then passes i
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!