Answer:
File manager
Explanation:
From the list of options 1 to 4, only option (2) is correct
Explaining the options one after the other
- Web browser: It lets users access the internet
- File Manager: Used to create and manage files/folders
- User Interface: Means which the user of a computer interacts with the computer
- File Reader: Used to read the content of a file. e.g. Adobe reader for pdf files, Notepad for text files, etc.
Having explained the options one after the other, <em>the file manager </em>is the answer to this question.
We are asked for the subnet mask and the total usable host. There are given values such as a network needs to be set up with 60 subnets given that the IPv4 class C address 192.168.100.0. The subnet mask is "255.255.255.0". The total host is "254".
Answer:
Distributed DOS attacks.
Explanation:
Computers in a network or the network itself is are prone to cyber attacks. A cyber attack is a concept of taking advantage of computer network vulnerabilities, to retrieve information from the target source. An example of these types of security attacks is the denial of service (or DOS) attacks.
The DOS or the distributed DOS attack prevents users form accessing or requesting a service that they are legitimately allowed, by flooding the target system with superfluous resource request from millions of computers, controlled by the attacker.
Answer:
ang answer po at proofreading written
content
Explanation:
if I wrong please correction me!
The type of physical drives does windows disable defragmenting, but provides another method of optimization is known as windows.
<h3>What is windows?</h3>
It should be noted that windows is a separate viewing area on a computer display screen in a system.
In this case, the type of physical drives does windows disable defragmenting, but provides another method of optimization is known as windows.
Learn more about window on:
brainly.com/question/25243683
#SPJ12