1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
9

What is the difference between posting and transfer in ICT please I need the answer before TMR​

Computers and Technology
1 answer:
Radda [10]3 years ago
7 0

Answer: b

Explanation: trust

You might be interested in
How to get back to previous page with no data lost in c# windows form application?
olya-2409 [2.1K]
You have to hit the back button
6 0
3 years ago
Why are people's visions of utopias and dystopias subjective?
Leno4ka [110]

Answer:

D. Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia.

Explanation:

3 0
3 years ago
What’s bigger 4,000,000 KB or 2.8 GB
Zanzabum

Answer:2.8 GB is bigeer

8 0
4 years ago
Read 2 more answers
A DNS server on your client's network is receiving a large number of DNS queries from what appears to be a workstation on their
drek231 [11]

Answer:

The answer is reflective DNS attack

Explanation:

Reflective DNS Attack is used in many distributed DDoS attacks to knock down an internet pipe. The attack is divided in two stages: first  the attacker sends lots of requests to one  or more legitimate DNS servers  while using spoofed source IP of the target person, and then, in the second stage, the DNS server receiving the semi-legitimate requests replies to the spoofed IP, thereby unknowingly lauching an attack on the target computer with responses to requests never sent by the victim.

4 0
4 years ago
Who is Majira Strawberry??? My Friend said it so i am wondering
otez555 [7]

Answer:

he/ she is a furry

6 0
3 years ago
Read 2 more answers
Other questions:
  • John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cab
    11·2 answers
  • The ____ keyword specifies that a function or method does not return a value.
    5·1 answer
  • Peripheral are used to
    6·1 answer
  • A _______ is a shortcut to a web page saved in a list in the internet explorer desktop application.
    14·1 answer
  • When light does not pass through or bounce off an object, it is said to be
    13·2 answers
  • 90 points can someone please write the code for this (HTML):
    13·1 answer
  • Before her shift as a cashier at the grocery store, Carla pulls her hair back into a ponytail and makes sure her fingernails are
    15·2 answers
  • Based on the information in the table, which of the following tasks is likely to take the longest amount of time when scaled up
    14·1 answer
  • This is the area that displays icons representing open applications.
    15·1 answer
  • What causes the hidden node problem in a wireless local area network (wlan)?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!