1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhuklara [117]
3 years ago
14

PLEASE HELP ILL GIVE POINTD AND BRAINLIEST

Computers and Technology
1 answer:
Nastasia [14]3 years ago
4 0

Answer:

I would have to say C.

Explanation:

Feel free to correct me if i'm wrong :)

Hope this helps

You might be interested in
Which mitigation technique would prevent rogue servers from providing false ip configuration parameters to clients?
IrinaVladis [17]
DHCP snooping is a mitigation technique<span> to </span>prevent rogue<span> DHCP </span>servers  <span>from </span>providing false IP configuration parameters to clients.  DHCP snooping<span> is a security feature that acts like a firewall between untrusted hosts and trusted </span>DHCP<span> servers. It is</span><span> a series of techniques applied to improve the security of a </span>DHCP<span> infrastructure. </span>
6 0
3 years ago
Read 2 more answers
Match the design feature or area of expertise with the benefit or increase in usability it offers. 1. standardized placement of
RSB [31]
<span>The match of the design feature or area of expertise with the benefit or increase in usability it offers would be the following:

 1. standardized placement of elements simplify reading and increase the transparency of the interface
2. plain fonts ensures software fulfills its function in an efficient manner that recognizes and solves likely issues of use
3. cultural fluency takes advantage of preexisting customer expectations regarding layout
4. well-structured program logic enables the designer to make appropriate choices in style and tone for the intended end user</span>
3 0
3 years ago
I need help quick Which of the following principles is not part of the constitution?
laila [671]

Answer:

Confederalism is not in the constitution it was adopted later.

Explanation:

5 0
3 years ago
In the context of the database design process, the conceptual design step that determines end-user views, outputs, and transacti
faust18 [17]
GUI (graphical user interface)
6 0
3 years ago
Plz answer all the questions :)
AURORKA [14]

Answer:

is there multiple choice or do i have to answer from my own words??

7 0
3 years ago
Other questions:
  • explain the key reasons why entity relationship modeling is important, and determine at least (1) way in which it impacts the ov
    5·1 answer
  • A manufacturer of machine tools creates a spreadsheet of tools and the cost for those. The spreadsheet has four fields: name of
    13·1 answer
  • Write the definition of a class Counter containing: An instance variable named counter of type int. An instance variable named l
    14·1 answer
  • What are the answers to everfi
    5·1 answer
  • Anusha wants to use her computer,rather than handwriting the information on her notepad,to analyze her monthly expenses to make
    14·1 answer
  • Which command will display each line in the text file based on the alphabet?
    10·1 answer
  • So i'm trying to figure out why this code wont run can anyone help me
    8·1 answer
  • What is the use of consonant in QBASIC ? Answer me in short and easy answer.​
    14·1 answer
  • Explain in details how Galen , a physician during the Middle Ages, expanded on Hippocrates' theory of the four humors and explai
    6·1 answer
  • suppose one packet switches between a sending host and a receiving host. the transmission rates between the sending host and the
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!