1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ipn [44]
3 years ago
9

Your ISP connects to the core routers of the Internet via a O backbone O satellite O cable mode Ospine​

Computers and Technology
1 answer:
jeka943 years ago
7 0

Answer:

The ISP connects to the core routers of the backbone

You might be interested in
Create a trigger that prevents anychange(insert, update, or delete)to the grade attribute of the takesrelation that would change
Alchen [17]

Answer:

The trigger code is given below

create trigger F1_Del

after delete on Friend

for each row

when exists (select * from Friend

where ID1 = Old.ID2 and ID2 = Old.ID1)

begin

delete from Friend

where (ID1 = Old.ID2 and ID2 = Old.ID1);

end

create trigger F1_Insert

after insert on Friend

for each row

when not exists (select * from Friend

where ID1 = New.ID2 and ID2 = New.ID1)

begin

insert into Friend values (New.ID2, New.ID1);

end

5 0
3 years ago
Create a multimedia project that contains the text element and all the contents that you have studied about that element
Marrrta [24]

Answer:

no sé jejejejeje

lslsl

lonsinet

ko

8 0
3 years ago
I need help please!!!!
MissTica
Just restart it and it will be fixed
5 0
3 years ago
Read 2 more answers
When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
Brilliant_brown [7]

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

4 0
3 years ago
An increase in Consumption will ___________ in the Classical Model of Aggregate Demand.
Step2247 [10]
The answer to your question is b
8 0
3 years ago
Other questions:
  • Laura would like to include additional text that is related to the document but not contained within the document.
    13·2 answers
  • Which of the following is a good choice to help you stay organized when you are away from the office? A. Personal Information ma
    7·1 answer
  • Some people are unable to arrange six matches to form four equilateral triangles because they fail to consider a three - dimensi
    6·1 answer
  • Assume that a picture is represented on a monitor screen by a rectangular array containing 2048 columns and 1536 rows of pixels.
    12·1 answer
  • Need help with this
    12·1 answer
  • How does video conferencing change the way we work today?
    6·1 answer
  • 1. Open the start file EX2019-ChallengeYourself-9-3. The file will be renamed automatically to include your name. Change the pro
    15·2 answers
  • Heeeeeeelp :)<br><br> hwjkwdlfo;pk
    8·1 answer
  • What is the answer <br> Answer 1<br> Answer 2<br> Answer 3<br> Answer 4
    13·2 answers
  • Study the graph and answer the questions. The numbers on the left side of the graph are in thousands.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!