1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ulleksa [173]
3 years ago
7

Which is an example of machine-to-machine communication?

Computers and Technology
1 answer:
maksim [4K]3 years ago
6 0

Answer:

Option A and E are the correct answer

Hope this may help you

Stay Safe, Stay Healthy, Stay Happy

You might be interested in
11.
Svetllana [295]
11. is battle of the bulge
12. rationing
13. trade embargo act
14. germany won the battle is not true
15. force jews to wear stars sown to their clothing to be caught without was punishable by death
3 0
3 years ago
With the sheets grouped, apply Underline to cell B5 and Double Underline to cell B6. Ungroup the worksheets. Note, use the Forma
Orlov [11]

Answer:

Check Explanation.

Explanation:

Task: (1). Apply Underline to cell B5 and Double Underline to cell B6.

(2). Ungroup the worksheets.

(3).use the Format Cells dialog box to ensure that the Underline styles Single and Double are applied, rather than Single Accounting or Double Accounting.

Steps to follow;

Step one: On the Excel document that you are working on, make sure you highlight from B6 cell to F6 cell.

Step two: Then, press CTRL+SHIFT+F.

Step three: from action in step two above, the "format cells dailogue box" will come up, click underline > (underline type) dropdown list > ok.

Step four: next, highlight from B7 to F7.

Step five: press CTRL+SHIFT+F. As in step two above.

Step Six: do the same thing as in Step three above.

Please note that to apply the SINGLE UNDERLINE, you need to type the data in the cell for cells of B6 to F6 ONLY.

Also, for DOUBLE UNDERLINE for B7 to F7; just type the data in the cell and it will apply.

4 0
3 years ago
What's the best way to change the font size of all your notes pages at once?
pav-90 [236]

i think number 9 is c.

5 0
3 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
RideAnS [48]

Answer:

True.

Explanation:

A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.

Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.

6 0
3 years ago
Could anyone beat my typing?<br><br> https://keyma.sh/custom/33K7C
insens350 [35]

Answer:

This should not be typed in brainly. Brainly is for answering questions

Explanation:

8 0
3 years ago
Other questions:
  • To increase the view of a document on the screen, use the _____. View icon Zoom slider full-screen reading boldface font
    9·1 answer
  • In terms of system thinking, what is process?
    15·2 answers
  • During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poo
    9·1 answer
  • Which of the following would an NSA professional most likely need?
    5·2 answers
  • A citizen of any group both
    6·1 answer
  • I need a utube name for a gaming channel....PLEASE HELP...BRAINLIEST
    5·1 answer
  • "Random Bars" is considered to be a Transition style<br> O True<br> O False
    11·1 answer
  • after landing, you are tying down the aircraft when a person approaches and asks: "faa. are you the pilot of this aircraft?" wha
    11·1 answer
  • Think about a career you would like to have 10 years from now.
    5·1 answer
  • A ______ system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on mult
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!