1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
10

ASAP BRAINLIEST!!!

Computers and Technology
1 answer:
Andre45 [30]3 years ago
8 0

Answer:

closed sounds right, dobt take my word for it doe

You might be interested in
Consider the following code segment.
lana66690 [7]

Answer:

W

X

After that an error would print and error

Explanation:

the last two statements are missing "ln"

6 0
3 years ago
Different between client server architecture and peer to peer architecture​
Vilka [71]

Answer:

In Client-Server Network, Centralized server is used to store the data.

8 0
3 years ago
9. Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when travel
tatuchka [14]

Answer:

True

Explanation:

It is known as Don-Not-Carry rules are implemmented to avoid

-Unauthorized full disk copies (it have been made while the laptop owner was out of the hotel room on overseas travel)

-Laptops steals

- Monitoring by third parties of wireless using.

3 0
3 years ago
Fonts can be selected from a font group on the ........ tab​
guapka [62]

Answer:

Home

Explanation:

8 0
3 years ago
Read 2 more answers
How many host addresses are needed in the largest required subnet?
prohojiy [21]
<span>The subnet is a logical subdivision of an IP network</span><span>
There are 25 host addresses needed in the largest required subnet.
</span>To subnet a network, bits from the host portion of the original network mask are changed into subnet <span>bits. The number of subnet bits borrowed from the host portion defines the number of subnets.
</span>
3 0
3 years ago
Other questions:
  • The _______ valve protects the air pump from reverse-exhaust pressure.
    11·1 answer
  • When can designers use rapid application development? HELP ASAP
    13·1 answer
  • C++
    8·1 answer
  • What is a sloper
    11·1 answer
  • A technician needs to be prepared to launch programs even when utility windows or the Windows desktop cannot load. What is the p
    11·1 answer
  • ____ means saving data in computer memory.
    13·1 answer
  • The following method is intended to remove all values from the ArrayList a that have the same value as val; however, this method
    8·1 answer
  • The Circle and CircleTester have been created, but they have errors. The public and private settings for variables and methods a
    8·1 answer
  • Which describes the "Network Effect?
    10·1 answer
  • The result of processing data ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!