1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
3 years ago
11

Blockquote

Computers and Technology
1 answer:
docker41 [41]3 years ago
3 0

Answer:

I don't knowthe answer

Explanation:

I really don't know the answer

You might be interested in
What device makes it possible for multiple customers to share one address
Galina-37 [17]
A=NAT is correct I think
6 0
3 years ago
Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a
Evgesh-ka [11]

Answer:

b) False.

Explanation:

Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, anAn IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message., is a FALSE statement.

5 0
3 years ago
Explain the changing of work and enterprises due to the availability of EFTPOS?
kolbaska11 [484]
Who benefits from piracy?



5 0
3 years ago
HURRRY WILLL GIVE BRAINLIST!!!!!!
Flura [38]

Answer:

true

Explanation:

the best way to learn is take notes eaverytime

some one trying to teaching you some

8 0
3 years ago
Please help me answer this question
goblinko [34]
Ram:
"The more RAM your CPU has access to, the easier its job becomes, which enables a faster computer"
rom:
"ROM is a special kind of memory which stores the instructions which the computer uses when it 'boots up'"
backingstorage:
"Without some type of backing storage, the computer would not have access to its data after the computer is turned off. "- its like a hard drive
5 0
3 years ago
Other questions:
  • Can the police track a phone if you post something on a social media platform even if the SIM card is out and location services
    7·2 answers
  • Making each password unrelated to the previous password provides an additional level of security through _____.
    7·1 answer
  • A database stores a large amount data in vertical ___
    10·1 answer
  • Help, with gaming unlocked
    12·1 answer
  • Creating a Graphical User Interface in Java
    11·1 answer
  • Expain the application areas of ICT in education sector and E-commerce​
    12·1 answer
  • Which of the following BEST describes Computer Science (CS)?
    8·1 answer
  • Immigrants are allowed to enter the country to work when they have a(n)
    10·1 answer
  • QUICK HELP ME PLEASE
    9·1 answer
  • 6) Which of the following an OPERATING SYSTEM? a) Window 7 b) excel c) PowerPoint d) Publisher​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!