1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
2 years ago
10

Please help me !!

Computers and Technology
1 answer:
gavmur [86]2 years ago
6 0

e. uhmmm

19+21=30

like....

easy.

What grade class is this? I wanna do it cause it easy AFef

You might be interested in
The 1934 Act proxy registration requirements: a. apply only to management. b. include a requirement for shareholders' proposals.
natita [175]

Answer:

The answer is "Option b"

Explanation:

The proxy is an external server, that distinguishes users from their browsing sites. It offers various features, privacy and security standards based upon the application, requirements or corporate policies, this act is used in the skilled security attorneys, primary care physicians, bookkeepers, brokers, and insurers shall apply securities laws, and other options are wrong, which can be explained as follows:

  • In option a, It is wrong, because it uses in every type of online software.
  • In option c, It is wrong, because it requests for dissident.
6 0
3 years ago
Panarchy considers the big picture because, in reality, smaller systems are embedded inside of larger systems and they influence
SVEN [57.7K]

Answer:

The connection will be represented by the pair of "Revolt" and "Remember".

Explanation:

  • In a nested structure, the panarchy system links the evolutionary periods. Several connections may have occurred between levels at one point of the engineered process and stages at another.The tags ' revolt ' and ' remember ' are two major connections.
  • Invent, explore, and check the smaller, quicker, clustered levels, while the bigger, slower rates preserve and maintain stored system dynamic allocation.
  • The slower and larger levels, therefore, set conditions under which quicker and smaller ones work.

Therefore, it's the right answer.

4 0
3 years ago
In case of an emergency, once you or someone already on the scene has contacted 9-1-1, the next thing to do is: A) Move them to
velikii [3]

if alone, you would give care first for which situation

4 0
3 years ago
Read 2 more answers
An administrator needs to examine ftp commands being passed to a server. what port should the administrator be monitoring?
Hitman42 [59]
Port 21

The server-PI (Server Interpreter) is the process that listens to port 21 on the FTP server. The Server Interpreter has control over server-DTP (Server Data Transfer Process), the method used for data transfer connection. The server-PI must be in a position to respond to standard FTP commands like USER and PASS and several other commands.

 

 



7 0
2 years ago
Which of the following describes an instance of legal hacking?
velikii [3]

Answer:

Ans A and/or B

Explanation:

5 0
2 years ago
Other questions:
  • What is the best way to protect computer equipment from damage caused by electrical spikes?
    9·2 answers
  • Software design and implementation are interleaved activities. The level of detail in the design depends on the type of system b
    5·1 answer
  • What is UNIX? A program for writing documents Graphical interface Internet browser Operating system
    8·2 answers
  • . The incorrect attitude towards driving is the cause of most collisions among teenage drivers.
    13·2 answers
  • class llist { private: record * start; char filename[16]; int readfile(); int writefile(); record * reverse(record * ); void cle
    11·1 answer
  • Ayúdenme con estas preguntas son para mañana porfis!!!
    12·1 answer
  • A popular photo editing application provides customers with the option of accessing a web based version through a monthly subscr
    11·1 answer
  • Variable index has a value of 4, and variable accessValid has a value of False. What value does variable, accessPoints, have aft
    7·1 answer
  • Write passage on computer virus​
    10·2 answers
  • What is the answer ??​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!