1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ipatiy [6.2K]
3 years ago
8

All software, services and protocols not required by the system or necessary being disabled or not installed is called:____.

Computers and Technology
1 answer:
mihalych1998 [28]3 years ago
8 0

Answer: Minimization

Explanation:

All the software, services and protocols

that's not required by the system or necessary being disabled or not installed is referred to as minimization

Minimization simply has to do with the uninstalling of the software that's useless and that's not using up the protocols as well.

Therefore, the correct option is D.

You might be interested in
Tools used to build a bridge<br>​
Sati [7]

Aerial Lifts,

Vertical Masts and Hydro Platforms,

Telehandlers,

Excavators,

Skid Loaders,

Backhoes,

Cranes,

Air Compressors.

If It was helpful, can you make me brainliest please?

6 0
3 years ago
The period of time during which an IDPS monitors network traffic to observe what constitutes normal network behavior is referred
horrorfan [7]

Answer: Training period

Explanation:

The training period is refers to the period of time where we can monitor all the network traffic and also observe all the networking behavior with the constitute.

  • During the training period we get a proper training about the specific topic and also get a chance to learn various types of things.

 According to the given question, in the training period an IDPS monitor is used observing the networking traffic and the network behavior. Therefore, raining period is the correct answer.

 Therefore, Training period is the correct answer.

5 0
3 years ago
What is equivalent to 5(3x-7)
serg [7]
5(3x - 7)

distribute the 5 to both 3x and -7

15x - 35 is equivalent

hope this helps
8 0
3 years ago
Read 2 more answers
_____ is responsible for packet forwarding. a. Transmission Control Protocol b. User Datagram Protocol c. Extensible Authenticat
Mazyrski [523]

Answer:

d. Internet Protocol

Explanation:

Internet Protocols suite  are used to transport packets from the host network across other networks. This task is usually performed by optimizing the size of each available packet, which are then forwarded through the internet protocol (IP) address.

Therefore, Internet Protocol is responsible for packet forwarding.

6 0
3 years ago
You are considering creating a mobile app. Describe a basic statement for the app you would create and whether your app should b
kondor19780726 [428]

if the game has either good graphics,good story, or good overall if should be paid to get

4 0
3 years ago
Other questions:
  • What are smart mobile devices?
    6·2 answers
  • Why people get addited to mobile and by playing games​
    13·1 answer
  • Write a function to sum the following series:
    8·1 answer
  • 1. In your own words, describe the purpose of a for a loop.
    11·1 answer
  • To move the first line of text over five spaces and leave the other lines of the paragraph aligned to the left, use the _____ fe
    12·2 answers
  • Quality answers will be appriciated! :)​
    15·2 answers
  • The production team for a fictional drama is shooting a key scene. One of the actors leaves out part of his scripted dialogue th
    12·2 answers
  • Write a program, TwoDimentionalGrid. Ask the user to enter the size of the 2 dimensional array. Here we are not doing any input
    13·1 answer
  • Instructions
    13·1 answer
  • What is a possible weakness of an expert-novice pair?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!