1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhuklara [117]
3 years ago
7

Help me pls...

Computers and Technology
2 answers:
den301095 [7]3 years ago
6 0

Answer:

None

Explanation:

A cell is a living thing it contains a plasma membrane, an outer covering that separates the cell’s interior from its surrounding environment; cytoplasm, consisting of a jelly-like region within the cell in which other cellular components are found; DNA, the genetic material of the cell; and  ribosomes, particles that synthesize proteins

netineya [11]3 years ago
3 0

Answer:

D, all of the above :)

You might be interested in
_______ refers to the use of gps or rfid technology to create virtual boundaries that enable software to trigger a response when
ludmilkaskok [199]

Geofencing Marketing refers to the use of gps or rfid technology to create virtual boundaries that enable software to trigger a response when a mobile device enters or leaves a particular area.

<h3>What is Geofencing Marketing?</h3>
  • Geofencing marketing is an illustration of a real-time location-based trade tactic that utilizes geolocation data to mark users within a specified geographic region and delivers a range based on where they are or in what areas they have previously visited.
  • Geofencing marketing concerns setting up virtual borders around a point or area that tracks whenever someone with a portable device crosses them.

To learn more about Geofencing Marketing, refer:

brainly.com/question/9795929

#SPJ4

4 0
2 years ago
Data are made anonymous by Destroying all identifiers connected to the data. Requiring all members of the research team to sign
mestny [16]

Answer:

Destroying all identifiers connected to the data.

Explanation:

Identifiers are your virtual location when navigating, if you destroy your 'Virtual ID', nobody could identify you. Also, you could hide your identifiers, in this case, there's a small risk.

3 0
3 years ago
Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in
mr Goodwill [35]

Answer:

Layer 2 destination address = 00-00-0c-94-36-ab

Layer 2 source address = 00-00-0c-94-36-bb

Layer 3 destination address = 172.16.20.200

Layer 3 source address = 172.16.10.200

Explanation:

To properly understand the given answer, let us define some terms used in the narrative of the question:

Subnet: The sub network or as popularly called subnet  is a logical division of the internet protocol of a network into many different and smaller network. It is typically used to create partitions or subdivisions of large networks into bits.

PDU: The PDU can be said to be an abbreviation for the word power distribution unit or protocol data unit.  It can also be refereed to as an IT device that possess many output ports or terminals. They are mostly used to distribute or transmit power or data to other operating devices with the telecommunication system.

Now referring back to the question asked and the image attached below, we can see that host a and b send their signal through subnet teachers while host c and d send their signal through subnet students thus,

Layer 2 destination address = 00-00-0c-94-36-ab

Layer 2 source address = 00-00-0c-94-36-bb

Layer 3 destination address = 172.16.20.200

Layer 3 source address = 172.16.10.200 are the correct destination.

4 0
3 years ago
The ability to share information between programs is what
Oksana_A [137]
Its called interagration
or linking and embedding 
and copy paste
8 0
3 years ago
What will the following code snippet print out? class Raspberry extends Fruit implements Boxable { ... } Raspberry berry = new R
sveticcg [70]

Answer:

The answer to this question is "TrueTrueTrueTrue".

Explanation:

In the java program code firstly we declare the class that is Fruit and an interface that is Boxable. In the class and interface, we write some code. Then we declare another class that is Raspberry. for class to class inherit we use the extends keyword and class to interface inherit we use the implements keyword. Then we create a Raspberry class object that is berry. and use the print command or method that is (System.out.println). In this, we write some code and run it. So the output of the program is true because all the code that is written in the method is correct.  

3 0
4 years ago
Other questions:
  • Sushant is a new manager and he wants to share his ideas and working protocol with his team.Compare the advantages and disadvant
    13·1 answer
  • which of the following are used on cable trays to protect the cable insulation from direct sunlight? a. barrier strips b. solid
    5·1 answer
  • After earning a learners license what test must be successfully passed to earn an operators license in Florida
    14·1 answer
  • In the year of our Lord 66, the Emperor Nero, being at that time in the twenty-ninth year of his life and the thirteenth of his
    10·1 answer
  • How to write a program converting RGB to CMYK in python
    6·1 answer
  • Gemima wants to show the amount of vitamin C a fruit salad contains in the blue cell of the table below. To do this, she needs t
    9·2 answers
  • How do you get free Wifi on your phone without paying
    6·1 answer
  • How much does a dodge tomohawk cost for a used one?
    7·1 answer
  • Which of these is an advantage of having multiple layers in a drawing and enables you to make changes to one part of an image wi
    14·1 answer
  • How do you get your winkey wet??
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!