1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka-Z-Leto [24]
3 years ago
7

This is not a factor that you should use to determine the content of your presentation. Your audience your goals your purpose yo

ur technology
Computers and Technology
2 answers:
horsena [70]3 years ago
8 0

Answer:

its your technology i just turned this assignment in

Explanation:

aksik [14]3 years ago
4 0

Your technology I believe

You might be interested in
____________________ material is information, graphics, images, or any other physical or electronic item that could have value a
djverab [1.8K]

Answer:

Explanation:

Evidentiary material is information, graphics, images, or any other physical or electronic item that could have value as evidence in a legal proceeding, whether criminal or civil. Information of evidentiary value may be found on digital  media such as CDs,  (DVDs), floppy disks, thumb  drives, hard drives, and memory expansion cards found in digital cameras and mobile  phones.

7 0
3 years ago
Question A low level distributed denial of service (DDoS) attack that involves SYN or SYN/ACK flooding describes what type of at
Morgarella [4.7K]

Answer:

TCP SYN flood

Explanation:

TCP SYN flood (a.k.a. SYN flood) is a type of Distributed Denial of Service (DDoS) attack that exploits part of the normal TCP three-way handshake to consume resources on the targeted server and render it unresponsive.

8 0
2 years ago
What are the differences between switches and routers? cse question
deff fn [24]

Answer:

The main objective of router is to connect various networks simultaneously and it works in network layer

Explanation:

The main objective of router is to connect various networks simultaneously and it works in network layer

7 0
3 years ago
These are templates or patterns that make it easier for users to enter data
kupik [55]

Answer:

A piece of code

Explanation:

8 0
2 years ago
An investigator responsible for tracking e-mail communication would begin by locating what
Ainat [17]
Email headers contains information about email
6 0
2 years ago
Other questions:
  • Is a network traffic management device used to connect different network segments together?
    9·1 answer
  • The memory allocated for a float value is ____ bytes.
    9·1 answer
  • What allows a person to interact with web browser software?
    13·2 answers
  • Which social media post indicates your home may be unattended?
    10·1 answer
  • Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. H
    9·1 answer
  • Weak Induction
    8·1 answer
  • Although a tablet can connect to a cellular network, it cannot be used as a
    11·2 answers
  • The National Institute of Standards and Technology (NIST) guidelines list four different states a mobile device can be in when y
    7·1 answer
  • Where are the results from the Advanced Find feature displayed?
    6·1 answer
  • Can i eat chicken and you shut
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!