1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MariettaO [177]
3 years ago
11

```{r}

Computers and Technology
1 answer:
Stells [14]3 years ago
4 0
Know what your trying to say her input pound 45-94
You might be interested in
You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public
irga5000 [103]

Answer:

Port security and violation mode.

Explanation:

A switch is a layer two device of the OSI model. It is used to transmit frames between nodes within a network. It transfers frames by discovering the destination Mac address and saving it to its address table, and sending the frame to the egest port to the destination.

The port security command is used to specify the Mac addresses that are recognised by a port. There are three types of port security, they are, dynamic, static and sticky Mac addresses that can configured on an interface.

The security violation command is used to decide what happens to a port when it detects an unfamiliar Mac address. The three security violation modes are protect, restrict and shutdown. It is used as an interface command alongside the port security command.

4 0
3 years ago
Using your own computer, give the name of the operating system that runs it and give examples of five legal file names. Then cre
Vika [28.1K]

Answer:

Name of Operating System: Ubuntu

Five legal file names:

inventory.txt

total.txt

NIKKAH.txt

Defaulter.txt

studenT.txt

Five illegal file names:

wel/come.txt

..

MY>note.txt

.

my<work.yxt

Explanation:

To fix the illegal name:

1. Remove the special character, so it becomes welcome.txt

2. Remove the double dot and rename using text characters

3. Remove the special character, so it becomes MYnote.txt

4. A file cannot be named using dot. So we rename to a textual name

5. Remove the special character, so it becomes mywork.txt

Some additional rule for naming of files legally in Unix is that, you cannot use a reserved word to name your file. Starting a file name with number is allowed. Starting a file name with dot make the file to be hidden.

7 0
2 years ago
For a typically large organization how many dns servers should you install
DiKsa [7]
<span>A large organization minimum at-least 2 DNS servers are needed. DNS servers are each internet domain in need. and Multiple server farms distribute the DNS Server. One of the DNS Server is must in separate location. install DNS server on all domain controller. DNS server on every domain controller is must.</span>
4 0
3 years ago
Write a program in C which asks the user for 10 integers and prints out the biggest one.
Anni [7]

Answer:

Following are the program in c language

#include<stdio.h> // header file

int main() // main function

{

   int ar[10],k,biggest; // variable declaration

   printf("Enter the ten values:\n");

   for (k = 0;k < 10; k++)  

   {

      scanf("%d", &ar[k]); // user input of 10 number

   }

   biggest = ar[0]; // store the array index of 0 into biggest variable

   for (k = 0; k< 10; k++) // finding the biggest number  

   {

    if (ar[k] >biggest)  

    {

    biggest = ar[k];

   }

   }

printf(" biggest num is %d", biggest); // display the biggest number

return 0;

}

Output:

Enter the ten values:

12

2

4

5

123

45

67

453

89

789

biggest num is 789

Explanation:

Here we declared an array ar[10] of type int which store the 10 integer values.

Taking 10 integer input from the user in array ar .After that iterating the loop and finding the biggest number by using if statement  and store the biggest number in biggest variable .

Finally display biggest number.

5 0
2 years ago
Apple users tend to like the company and love its products. Apple has successfully nurtured this __________ component of its cus
Nina [5.8K]

Answer:

Apple users tend to like the company and love its products. Apple has successfully nurtured this Affective component of its customers' attitudes.

Explanation:

There are three component of attitudes, they include the behavioral component, the affective component and the cognitive component.  

The affective component of attitude is concerned about the emotional response attached to an attitude.  The affective component  involves a person’s feelings / emotions about the attitude object.  i.e it is basically concerned with the emotional reaction of a person or customer to a particular object or good.  

Hence, apple users liking the company and loving its products shows that Apple has successfully nurtured the affective component of its customers' attitude.  

4 0
3 years ago
Other questions:
  • Which finger types the highlighted keys on a number keypad? A. Third B. First C. Pinky D. Thumb
    7·2 answers
  • According to the article in WikiAnswers, digital communication systems have more benefits than analog systems. They are faster a
    10·2 answers
  • What type of program would use to create a personal budget?
    14·1 answer
  • There are two activities on your schedule, which are: 1) install server in lab 2) move server into the data center. however, the
    6·1 answer
  • Which port-authentication network access control standard forces devices to go through a full authentication, authorization, and
    13·1 answer
  • Label 14 parts of the inside of a computer
    6·1 answer
  • 1. Which of the following is not related to a buffer overflow? A. Static buffer overflow B. Index error C. Canonicalization erro
    10·1 answer
  • Can a dod activity enter into a service contract for a military flight simulator without getting a waiver from the secretary of
    13·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
  • Which actions represent parody?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!