1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GuDViN [60]
3 years ago
8

Pls help!!!!! I need these questions

Computers and Technology
2 answers:
g100num [7]3 years ago
8 0

Answer:

online identity for the first one and none of the above for the second one:)

lidiya [134]3 years ago
7 0
Online identity for the first and none of the above fire the second. Hope this helps :)
You might be interested in
What is a fragmented disk?
jeka94
Disk fragmentation occurs when a file is broken up into pieces to fit on the disk. Because files are constantly being written, deleted and resized, fragmentation is a natural occurrence. When a file is spread out over several locations, it takes longer to read and write.
7 0
3 years ago
Hãy giúp tôi giảiiii​
Kazeer [188]

Answer:

fiikslid wugx uesbuluss wuz euzsbwzube

8 0
3 years ago
The internet's data gathways rely on what kind of hardware devies to route data to its destination?
Gennadij [26K]

Answer:

router

Explanation:

4 0
3 years ago
Write a Java program that will be able to generate the sample table below.
Gwar [14]

Answer:

class Main {

 public static void fillTable(int [][] t, int or, int oc) {        

   for(int r=0; r<t.length; r++) {

     for(int c=0; c<t[r].length; c++) {

         t[r][c] = Math.max(1+Math.abs(r-or), 1+Math.abs(c-oc));

       }

   }

 }

 public static void dumpTable(int [][] t) {

   for(int r=0; r<t.length; r++) {

     for(int c=0; c<t[r].length; c++) {

       System.out.printf("%3d", t[r][c]);

     }

     System.out.println();

   }

 }

 public static void main(String[] args) {

   int origin_row = 3;

   int origin_col = 2;

   

   int[][] table = new int[5][4]; // rows|cols

   fillTable(table, origin_row, origin_col);

   dumpTable(table);

   

 }

}

Explanation:

Above program does not contain input handling and exception handling, but it does contain the cleverness of calculating the cell values. I'm hoping you can add the input handling yourself?

7 0
3 years ago
Which original VPN protocol is supported by most platforms but offers low levels of security?
Masja [62]

Answer:

vpn

Explanation:

PPTP is the least secure. ...

L2TP/IPsec is a good VPN solution for non-critical use; however, this protocol, like PPTP, has been compromised as well. ...

Across many areas of the IT world, OpenVPN is easily the best all-around VPN solution.

7 0
2 years ago
Other questions:
  • A device that produces a permanent human-readable text of graphic document.
    15·1 answer
  • What does a graphic organizer do
    6·1 answer
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    15·1 answer
  • Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
    13·1 answer
  • 4-One possible performance multiplication enhancement is to do a shift and add instead of an actual multiplication. Since 9 * 6,
    12·1 answer
  • When all RGB colors have the same value, the resulting color will most likely be some variation of _______________.
    11·1 answer
  • Which of the following sentences is correct?a. Arithmetic log unit is used to perform both integer and floating point computatio
    8·1 answer
  • A support agent who feels that a user needs substantial assistance with the organization of files on their pc should ____.
    5·1 answer
  • Zahra's softball team needs money for team T-shirts. The coach makes some fundraising suggestions, while team members brainstorm
    5·2 answers
  • HELP PLSSSSS!!! I WILL MARK BRAINLIEST FOR THE FIRST AND CORRECT ANSWER!!!
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!