1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
15

How does visualizing help you better understand a poem?​

Computers and Technology
1 answer:
Roman55 [17]3 years ago
6 0
By putting images in your head you will start to experience the poem, u will start to live the poem, easier to know any thing about it as you are feeling everything in the poem
You might be interested in
How do you delete a slide from your presentation after selecting it
Sergeeva-Olga [200]
Use your right clicker and it should pop up as delete slide

6 0
4 years ago
What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?
Artist 52 [7]

Answer:

message confidentiality

Two or more hosts communicate securely, typically using encryption. The communication cannot be monitored (sniffed) by non trusted hosts. The communication between trusted parties is confidential.

message integrity

The message transported has not been tampered with or altered. A message has integrity when the payload sent is the same as the payload received.

Sending a message confidentially does not guarantee data integrity. Even when two nodes have authenticated each other, the integrity of a message could be compromised during the transmission of a message.

Yes, you can have integrity of a message without confidentiality. One can take a hash or sum of the message on both sides to compare. Often we share downloadable files and provide data integrity using md5 hash sums.

Explanation:

3 0
3 years ago
You are looking for a backup that copies only the files that have changes since the last full backup. Which of the following wil
adelina 88 [10]

Answer: d. incremental backup

Explanation:

In incremental backup it copies only the files that have changed since the last full backup. It does not backup all the files just like the full backup. it however backup those copies into the  system which has changed since the last backup.

In doing  so it just increases the efficiency and performance of the backup procedure. This process is basically preferred when the amount of file to be backup is huge and there is not enough time to do a full backup.

Increment backup also use less disk space.

Cloud backup uses most increment backup for its application.

6 0
3 years ago
What is a client server network and its features?​
maks197457 [2]

Answer:

A client-server network is the medium through which clients access resources and services from a central computer, via either a local area network (LAN) or a wide-area network (WAN), such as the Internet. ... A major advantage of the client-server network is the central management of applications and data.

8 0
3 years ago
It keeps saying “something is going wrong oops!” when i click on my brainly notifications what do I do
AveGali [126]

Answer:

check your app permissions it may be blocking them or try resetting the app

4 0
3 years ago
Other questions:
  • What is wrong with this line of python code
    9·1 answer
  • A dmz is a subnet of _____________ accessible servers placed outside the internal network.
    10·1 answer
  • . Convert BAC4 from hexadecimal to decimal. Show your work.
    9·1 answer
  • Write the constructor for the Theater class. The constructor takes three int parameters, representing the number of seats per ro
    7·1 answer
  • How does the View tab of the ribbon allow you to look at a document?
    9·1 answer
  • Which term is used to describe a public-key, cryptography-based mechanism for proving the source (and possibly integrity) of a d
    12·2 answers
  • What is digital scavenger hunting? A. An application that locates addresses B. A scavenger hunt where players use GPS and digita
    5·1 answer
  • Write its features:features of computer ​
    15·1 answer
  • Given main(), complete the Car class (in files Car.h and Car.cpp) with member functions to set and get the purchase price of a c
    6·1 answer
  • A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a singl
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!