1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANEK [815]
2 years ago
14

Mention any

Computers and Technology
1 answer:
Nadya [2.5K]2 years ago
5 0

Answer:

There are a few differences between classical and traditional technology. Traditional technology is something that has always been done and classical technology is something that was once done.

Explanation:

You might be interested in
When the code that follows is executed, a message is displayed if the value the user entersvar userEntry = (prompt("Enter cost:"
Reika [66]

Answer:

The answer is "Option b".

Explanation:

In the given-code variable "userEntry" is defined that prompt the user to input value and in the next step, the conditional statement is used, which checks the input value is not a number and greater than 500 with use of OR operator. if the condition is true it uses the alert box to print the message, that's why in this question except "choice b" all were wrong.

4 0
3 years ago
Where does an MPLS label go in a PDU?
Natalija [7]

Answer: Between Layers 2 and 3

Explanation:

In between Layer 2 and Layer 3 the MPLS header is present and is known as Shim header. It is also said to be in 2.5.

6 0
2 years ago
Your organization has hired a penetration tester to validate the security of your environment. The penetration tester needs to d
yulyashka [42]

Answer:

Port scanner

Explanation:

The penetration tester would most likely use a port scanner. A port scanner can be explained to be an application that is made to check a server or host for ports that are open. This application can also be used by administrators to check their security networks so as to know those network services that are running on a host and also to know existing vulnerabilities. Attackers also use this to exploit victims.

5 0
3 years ago
Carlie was asked to review a software prject for her company and determine what materials are needed. Whihc part of project mana
Helga [31]

Answer:

The answer is "Resources".

Explanation:

All services should definitely be reviewed through Carlie. However many Software Developers, Reviewers, and others are accessible are important to find out. Only then can Carlie find out because needed, the exact timelines. Because whenever establishing precise deadlines, she needs to take a look at the tools, that's why the above given choice is correct.

8 0
3 years ago
First answer gets to be marked brainliest !!!!!
Ira Lisetskai [31]

Answer:

1.total access admin

2.total visual agent

3.total access analyser

4.total access detective

5. total access emailer

3 0
2 years ago
Other questions:
  • PLEASE HELP
    14·2 answers
  • How important is technology in education? what technology-related skills can you contribute to a school district answers?
    13·1 answer
  • A slideshow that accompanies an oral report is known as what?
    6·1 answer
  • Crop marks are used on an illustration to indicate to the printer the
    10·1 answer
  • Why is the cyber community important???
    8·2 answers
  • Which method will return the first element in an ArrayList employees?
    5·1 answer
  • What are the purposes of a good web page design?
    9·2 answers
  • Function _one(array)
    6·1 answer
  • Why was the tesla model s help change the was we see EV
    12·1 answer
  • Hi you probably don't care but if u want a gift card use my code GCQ7B on fetch rewards must scan a receipt first
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!