1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna11 [10]
3 years ago
11

I WILL GIVE BRAINLIST THING TO WHOEVER GIVES ME THE CORRECT ANSWER

Computers and Technology
1 answer:
Anna11 [10]3 years ago
4 0

Answer:

Evaluate and compare free and commercial versions of the antivirus software provided at the link above. Based on the information you learned in this Unit, what differences, if any, are significant enough to warrant considering paying for the software versus using the free version (for a typical home user, if the specific annual costs were not a major consideration)? What is “missing” from the personal/home/base level subscription that you might want?

Explanation:

You might be interested in
Write a program that calls a function to change a variable value from miles to kilometers.
Aneli [31]

Answer:

#include <iostream>

using namespace std;

void miles_to_km(float &miles)//function to convert miles to kilo meters.

{

   miles=miles*1.6;

}

int main() {

   float miles;

   cout<<"Enter the miles"<<endl;

   cin>>miles;//taking input of the miles..

  miles_to_km(miles);//calling function that converts miles to km..

   cout<<"The number of km is "<<miles<<endl;//printing the km.

return 0;

}

Output:-

Enter the miles

54

The number of km is 86.4

Explanation:

I have created  a function miles_to_km of type void which has the argument miles passed by reference.In the function the variable miles is converted to kilo meters.Then in the main function the function is called with the value prompted from the user.Then printing the changed value.

7 0
3 years ago
When a windows computer starts, it initiates the stateless address autoconfiguration process, during which it assigns each inter
stiks02 [169]
1) <span>The IPv6 implementation on the system construct a link-local address for
     each interface by using the fe80::/64 network address
2) </span><span> Using IPv6 Neighbor Discovery protocol, the system check if the
     address is a duplicate 
</span>3) <span>Knowing the link-local address is unique, it configures the interface to use
    that address
4) </span><span>The system uses the Neighbor Discovery protocol to transmit Router
     Solicitation messages to the all routers multicast address 
5) </span><span>The router on the link uses the ND protocol to relay Router
     Advertisement messages to the system 
6) </span><span>By using the information it receives from the router, the system produce
    a routable address and configures the interface to use it </span>
5 0
3 years ago
If you know the result you want a formula to produce, you can use _______________ to determine the value of a cell on which the
Ann [662]
A formula triangle ///////////////////////////////////////////////////
7 0
3 years ago
These factors limit the ability to attach files to e-mail messages. location of sender recipient's ability to open file size of
NeX [460]

The answer is

Recipient's ability to open file

Size of file

Sometimes, it might occur that the email message attachment you’ve sent to someone has an error or is corrupt and thus, limits the recipient ability to open the file. Another factor is the size of the file. All email servers limit the size of the file attached in an email that a recipient can receive mainly because of security reasons. Google Mail, for instance, only allows you to send 25MB only. This might limit the ability to attach files to e-mail messages as well.

3 0
3 years ago
Read 2 more answers
A scientific question may lead to a(n) , which can be tested.
kari74 [83]
A hypothesis or educated guess
6 0
4 years ago
Read 2 more answers
Other questions:
  • One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
    5·1 answer
  • Dolphin Tecx is a new tech company that just issued smart watches to its
    9·1 answer
  • 3. The combination of keys that we should press to select all document is
    14·1 answer
  • To save a file so that it can be opened on most computers, select the ____ option.
    10·2 answers
  • Which activity might require you to provide your social security number
    8·2 answers
  • Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the data transmitted on its segment. It can
    5·1 answer
  • ANY MHA FANS SAY DEKU
    6·1 answer
  • List and explain three computing devices from the 20th century​
    13·2 answers
  • What do you think that private information like passwords, PIN numbers, will be guarded or shared with the public? Why?​
    13·1 answer
  • Which statement correctly describes the difference between an IP address and a MAC address for a
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!