1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goryan [66]
3 years ago
9

Can anyone talk to me?

Computers and Technology
2 answers:
Nina [5.8K]3 years ago
5 0
Yes sure what’s up? You okay??
marta [7]3 years ago
3 0

Answer:

lol what, this is a web for asking questions lol

Explanation:

You might be interested in
Which of the following are benefits of designing a scalable system? Choose 3 options.
zhenek [66]

Which of the following are benefits of designing a scalable system? Choose 3 options.

  • ability to maintain a high level of service for customers ✔

system will never need to grow again

  • Ability to respond to user volume issues more quickly ✔
  • guaranteed system access for all users ✔

users may never know that a site has experienced tremendous growth

4 0
3 years ago
Which topology connects multiple star-topology networks using a bus topology?
Oliga [24]

Answer:

Mesh

Explanation:

Hope it will help

<h2><em>p</em><em>l</em><em>e</em><em>a</em><em>s</em><em>e</em><em> </em><em>m</em><em>a</em><em>r</em><em>k</em><em> </em><em>a</em><em>s</em><em> </em><em>a</em><em> </em><em>b</em><em>r</em><em>a</em><em>i</em><em>n</em><em>l</em><em>i</em><em>s</em><em>t</em><em>s</em></h2>
3 0
3 years ago
Computer a sends a packet intended to reach computer f. along its path it arrives at computer
disa [49]
<span>To the computer f, this answer is because when reading the statement I assume that there is no type of connection and / or communication between the computer a and c; therefore to be profitable the computer c should return the package sending it back to computer f.</span>
5 0
3 years ago
Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how
GenaCL600 [577]

Explanation:

Tech companies focus on making advancement in technology products and services. They are driven by innovations and the use of technology to make them standout from other companies.  They uses technology to render services.

Cyber attack is a deliberate attack on companies' computers or on an individual computer with the intention of stealing information, or other reasons without victim approval.

How policies on encryption could be implemented to prevent cyber attacks by:

Cyber security policies explain the guidelines on how organization staffs and end-users access online applications and internet resources without fear of security details being hacked.

1. Rules should be set on how to use email encryption: This rule should be easy to read. Emails should be encrypted to provide safety from cyber attacks. Contents should not be visible, should only be visible to those sending and receiving such emails.

2. Rules on encryption of sensitive messages and back up data.

3. rules on encryption of Log in details and passwords

7 0
3 years ago
In some instances, a user deliberately or accidently interrupts a print job, stalling the queue until the partial job is removed
Verizon [17]

The answer is Print spooled documents first.

You are required to spool print documents so that programs finish printing quickly and begin to print after last page is finally spooled. Selecting this option prevents pending jobs from stalling the queue. To adjust to this option, you should go to the advanced tab of your network printer.






6 0
3 years ago
Other questions:
  • ____ occurs when data is entered into the computer.
    6·1 answer
  • 19. Squares. Write a program class named SquareDisplay that asks the user for a positive integer no greater than 15. The program
    11·1 answer
  • The times per second an audio file is converted from analog to digital is the ______. audio file format bandwidth sample rate wa
    5·2 answers
  • ________ errors may indicate that an attacker is trying to send invalid data to the server. 404 303 500 512
    11·1 answer
  • Good afternoon guys !!!
    14·2 answers
  • Which of these is an aggregator?
    5·2 answers
  • On the Loan worksheet in cell c9 enter PMT function to calculate the monthly payment for the Altamonte springs 2018 facilities l
    11·1 answer
  • What is cloud computing?
    9·1 answer
  • 18. Hard skills can be used on almost any job. (3 points)<br> A. True<br> B. False
    13·2 answers
  • Use a for loop to output the numbers from 50 to 65
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!