1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amid [387]
3 years ago
10

Question 2 of 10

Computers and Technology
1 answer:
Brums [2.3K]3 years ago
4 0

i thinkkkkkkkkkkkkkkkk D
You might be interested in
How do you navigate multiple computer screen at one time?
meriva
Use team vewer its made for that kinda stuff
6 0
3 years ago
______________is a collection of technologies for abstracting the details of how applications, storage, network, and other compu
Daniel [21]

Answer:

The correct answer to the following question will be "Cloud computing".

Explanation:

A series of technologies too abstract the specifics of how users are supplied with the software, data, network, and other computing services, called Cloud computing. On-demand, the accessibility of computer resources, database space, and computational complexity, with little or no particular active user administrators.

This term is commonly used to define network infrastructure which is available to several users over the internet.

There are different types of cloud computing. These are as follows:

  • Infrastructure-as-a-Service (IaaS).
  • Software-as-a-Service (SaaS).
  • Platform-as-a-Service (PaaS).

Therefore, Cloud computing is the right answer.

7 0
3 years ago
Which protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication?
amid [387]

The L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

<h3>What is vpn?</h3>

VPN is known as a Virtual Private Network extends a private network across a public network and activates users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

The main difference between VPN proxy and a VPN is encryption and VPNs hides all the web activities performed by the user as well as user's private IP address.

Therefore, the L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

Learn more about VPN here:

brainly.com/question/17272592

#SPJ4

3 0
2 years ago
Please answer........
Vitek1552 [10]

Using the try-except statement, the fix is as follows:

while True:

   try:

       boxes = int(input("How many boxes do you have?"))

       sweaters = int(input("How many sweaters do you have?"))

       break

   except:

       print("Input invalid")

sweatersPerBox = sweaters/boxes

print("You need to put",sweatersPerBox,"sweaters in each box")

<h3>How to prevent the program from crashing?</h3>

The program is given as:

boxes = int(input("How many boxes do you have?"))

sweaters = int(input("How many sweaters do you have?"))

sweatersPerBox = sweaters/boxes

print("You need to put",sweatersPerBox,"sweaters in each box")

The above program would crash when the user enters string inputs.

Examples of string inputs are "7h", "bh"...

One way to fix the error is the use of the try-except statement.

Using the try-except statement, the fix is as follows:

while True:

   try:

       boxes = int(input("How many boxes do you have?"))

       sweaters = int(input("How many sweaters do you have?"))

       break

   except:

       print("Input invalid")

sweatersPerBox = sweaters/boxes

print("You need to put",sweatersPerBox,"sweaters in each box")

The above program would continue running until the user enters a valid input

Another way is to end the program when the user enters string inputs

Read more about python programs at:

brainly.com/question/26497128

#SPJ1

7 0
2 years ago
ICS encourages jurisdictions to use common terminology. Common terminology:
ololo11 [35]
The answer is (a) Uses plain English to allow personnel from different agencies to work together.
ICS or Incident Command System is a systematic tool used for the control, command, and coordination of emergency response. To work together, the ICS allows the use of common terminology and operating procedures.  
3 0
3 years ago
Other questions:
  • The different between a compiler and a translaror
    9·2 answers
  • Which feature of a blog marks a unique link to each post through which it can be recalled anytime?
    8·2 answers
  • You would like to emphasize certain key terms on a slide with a bold format. Which slide element should you modify to provide th
    15·2 answers
  • PLEASE HELP ASAP
    13·2 answers
  • How computer network reduce the cost of computer hardware? explain with example.​
    12·2 answers
  • For what specific purpose is the TM9400 P25 Mobile designed? What is the benefit of having a mobile communications device that a
    10·1 answer
  • What is another term for additive manufacturing
    7·1 answer
  • By dividing the control plane from the data plane, SDN offers the flexibility to view the entire data plane infrastructure as a
    11·2 answers
  • Can you help me with Computer issues graphic organizer?<br> Will give out brainly
    6·1 answer
  • What does playstation network is currently undergoing maintenance?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!