1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iragen [17]
3 years ago
7

Assignment 6: Animation

Computers and Technology
1 answer:
maw [93]3 years ago
7 0

Answer:

huh?

Explanation:

what is assignment 6: animation?

You might be interested in
Will the fcc ruin the internet affect uk
n200080 [17]
No it will not the FCC is a federal owned company by the United States and has no control over any other servers outside of the US
3 0
3 years ago
What is the relationship between CAD and CIM ?
Marat540 [252]
<span> CAM( computerised Aided Manufacture) is when you have workers being helped by computerised tools, CIM (computerised intergated manufacture) is when the whole process is computerised, in manufacture this usually uses robotic arms. These can manufacture 24/7 in needed, they can work very accurately ( they are faster and stronger than a human arm) </span>
5 0
3 years ago
Read 2 more answers
What will happen when users attempt to connect via Telnet or SSH for enable mode when neither the enable secret password command
vovikov84 [41]

<u>Attempt to connect via Telnet or SSH for enable mode:</u>

  • Normally telnet and SSH ism to used login to network socket. Basically to login user is prompted with password and verified.
  • Secret password is one more level to login to access the network.
  • It is used to login copy files to web server so that website pages are update. End user can copy or move the files from web server or cloud computer or UNIX servers.
  • Enable secret password if it is configured, end user login with encrypted technology and plain text format is displayed.
  • Different between enable secret and enable password is enable secret is encrypted and enable password is not encryption and plain text.
6 0
3 years ago
Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri
inna [77]

Answer:

The answer to the following question is "inspecting packets in isolation from their context".

Explanation:

Static Packet Filtering a technique for implementing security of the firewalls. In this process, it checks each packet against a group of commands if commands allow the type of packet then it is passed otherwise, it is dropped. It controls access to a network by analyzing the sending and receiving packets based on the IP addresses of the source and destination.

7 0
3 years ago
In what order does the Cascade look at factors to determine which CSS rule to follow?
Vinil7 [7]

Answer:

In other words, the CSS rules can "cascade" in their order of precedence. Where the rules are located is one factor in the order of precedence. The location order of precedence is: browser default rules, external style sheet rules, embedded styles, and inline style rules.

5 0
3 years ago
Other questions:
  • A(n) _____ is the highest educational degree available at a community college. master bachelor associate specialist
    13·2 answers
  • A word that has a specific, predefined meaning in a programming language is called
    8·1 answer
  • The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer sy
    14·1 answer
  • Networking and telecommunications technologies, along with computer hardware, software, datamanagement technology, and the peopl
    11·1 answer
  • Breaking down a problem to find the solution is called:
    8·1 answer
  • How does the Evaluate Formula dialog box help fix errors?
    9·2 answers
  • • Comments are blank which can be blank entered into documents
    5·1 answer
  • When an organizatin needs a program to do a very specific job, it mayhire someone to write _____ software.​
    10·1 answer
  • Explain the term software dependability. Give at least two real-world examples which further elaborates
    9·1 answer
  • Lattice-based access controls use a two-dimensional matrix to assign authorizations. What are the two dimensions and what are th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!