1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leva [86]
2 years ago
12

Can someone please help me answer the extension activity and the exit ticket. I’ll award you. Thanks❤️.

Computers and Technology
1 answer:
likoan [24]2 years ago
4 0

Answer:

аочолвдвбвчшчшчшв7ага7чгчгввг

You might be interested in
Which of the following is an Internet supervisory protocol? O DNS IP O both A and B O neither A nor B
skelet666 [1.2K]

Answer: Both A and B (DNS and TCP/IP)

Explanation: Internet supervisor protocols are the protocols that  have the supervising standards for the internet functioning. DNS (Domain name system)is the system that supervises the internet by the function of the domain names that is accessed by the user.It acts like phone phone book  that coverts the domain to the IP address.

TCP/IP is the(Transfer control protocol/Internet protocol) are the protocols that help in the function of the internet by providing the connection with the network.The internet runs with help of TCP/IP suite.Thus both, DNS and TCP/IP are supervisory protocol for internet.

6 0
3 years ago
How do I get more points?
9966 [12]

You can get more points by answering questions, and completing challanges.

I hope this helps!

-LizzyIsTheQueen


6 0
3 years ago
Read 2 more answers
Which of the following BEST describes a permissive software license?
Olegator [25]

Answer:

B

Explanation:

A permissive software license is a free-software license which carries a minimal restrictions on how the software can be used, modified, and redistributed, usually including a warranty disclaimer.

I hope this helps.

Please rate me brainliest.

8 0
2 years ago
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
2 ways to assign a value to a variable
Art [367]
Assigning values at run time
Assigning values as command line argument, before execution of the program

4 0
3 years ago
Other questions:
  • Jim has entered the age of each of his classmates in cells A1 through A65 of a spreadsheet. Which function should Jim use to fin
    11·2 answers
  • What exactly is a byte? A byte is a term that is short for binary digit. 8 bytes hold about one letter, one number, or one speci
    10·1 answer
  • 1. _______ is when two things happen at one time when using the Scratch program.
    6·1 answer
  • Which of the following terms means that the system changes based on
    14·1 answer
  • Gemima wants to order the different kinds of food alphabetically on the table. Which actions should she take? Check all that app
    8·2 answers
  • In linear​ programming, what are restrictions that limit the degree to which a manager can pursue an​ objective?
    15·1 answer
  • What is the output of the following program?
    11·1 answer
  • Which is NOT one of the basic characteristics of life? What feature of Microsoft
    5·1 answer
  • 5. Write the name of the tab, command group, and icon you need to use to access the
    11·2 answers
  • Xbox one is not turning on and power brick is orange why is that?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!