1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madam [21]
3 years ago
15

PLEASE HELP

Computers and Technology
1 answer:
lesantik [10]3 years ago
3 0

Answer:

follow me pls tank you

Explanation:

im very happy if you follow me

You might be interested in
A "shooting star," or meteor, is actually a meteoroid that burns up in Earth's atmosphere.
Vikentia [17]

The answer is true. Shootings stars are, in fact, meteors. The trail you see behind them is the burning, chemical trail it leaves behind. Kinda like a rocket reentering the atmosphere.

4 0
4 years ago
Symmetric cryptography uses identical keys for both encryption and decryption. True False
Margarita [4]

Answer:

True

Explanation:

7 0
3 years ago
Provide the subnet, broadcast address and the valid host ranges for each of the
avanturin [10]

Answer:

You should now be able to give IP addresses to 254 hosts. This works fine if all 150 computers are on a single network. However, your 150 computers are on three separate physical networks. Instead of requesting more address blocks for each network, you divide your network into subnets that enable you to use one block of addresses on multiple physical networks

Explanation:

3 0
3 years ago
Which software is used to play, create, and modify audio and video files?
Alenkasestr [34]
Windows Movie Maker, iMovie, Final Cut Pro (x), QuickTime?
8 0
4 years ago
Read 2 more answers
How to fix this.. facing this problem to upload logo
AlekseyPX
I use an app called codechecker that helps with me having issues like that cause 99% of the time I'll mess it up.
7 0
3 years ago
Other questions:
  • Sorts by value in reverse order; keeps the same key
    6·1 answer
  • Neighbor discovery performs many of the functions that icmp router discovery and icmp ____ handled in ipv4.
    13·1 answer
  • A compound document contains _______ from different applications.
    12·2 answers
  • Lab Assignment 3 Phase 1 Create a class named Car, which is supposed to represent cars within a Java program. The following are
    6·1 answer
  • Public classes are accessible by all objects, which means that public classes can be ____, or used as a basis for any other clas
    10·2 answers
  • You want to copy data from one cell or range to an adjacent cell or range in your spreadsheet, without using a shortcut key. Whi
    10·1 answer
  • Melissa is working on her Cell class by adding new methods. However, in her most recent version, she is receiving errors in some
    14·1 answer
  • Write a paragraph on 'Save Earth Save Life.'​
    12·1 answer
  • When does if(x==y) execute?
    12·1 answer
  • Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understandin
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!