1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
14

Can i have help for a ggogle class room

Computers and Technology
1 answer:
Nesterboy [21]3 years ago
6 0

Answer the picture is blank so i was going help but the pic is blank

Explanation:

You might be interested in
Use the drop-down menus to complete statements about the Quick Steps function.
Sloan [31]

Answer:

  1. pray the god for your answer

Explanation:

I lllllllllllllll believe the Jesus

7 0
2 years ago
A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the aut
rewona [7]

Answer:C) PEAP(Protected Extensible Authentication Protocol)

Explanation: PEAP(Protected Extensible Authentication Protocol) is the protocol that is used in point-to-point network connection and wireless network connection.It is the version of EAP(Extensible Authentication Protocol) with the advantage of protection to maintain the security.

Other options are incorrect because EAP-FAST is the EAP protocol with that has flexible authentication through secure tunneling, EAP-TLS is the EAP protocol with the transfer layer security and EAP is used for the expansion of authentication method for the network between internet and computer system.Thus, the correct option is option(c).

7 0
3 years ago
Word provides an undo button that can be used to cancel the most recent command or action. true or false.
erastova [34]
The answer would be true.
7 0
3 years ago
Read 2 more answers
NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, emplo
WITCHER [35]

Answer:

The answer is "Option a".

Explanation:

In cloud computing, it is also known as the model, that enables you for accessible, convenient, through the-demand network access to global computer resources, which can be rapid to get and published via low administrative effort.  

Its recommending selection for the cloud providers support for the robust encryption, that has adequate replication processes in place, use user authentication, or provide ample clarity to customers regarding mechanisms that defend subscriptions against other subscriptions and the supplier.

8 0
3 years ago
Python is an example of a low level programming language true or false?​
alekssr [168]
False- python is an example of a high level language. Other high levels are c++, PHP, and Java
6 0
3 years ago
Other questions:
  • The purpose of the ________ element is used to configure the main content of a web page document.
    5·1 answer
  • Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his n
    11·1 answer
  • Implement a java program to find the smallest distance between two neighbouring numbers in an array.
    7·1 answer
  • Which method of accessing FTP has the most limited capabilities?
    9·2 answers
  • To print the number of elements in the array named ar, you can write :
    10·1 answer
  • Similarities between drawing toolbar and editing toolbar​
    12·2 answers
  • The individual accountable for ensuring the day-to-day operation of the InfoSec program, accomplishing the objectives identified
    7·1 answer
  • OBJECTIVE QUESTIONS
    10·1 answer
  • Please answer the following question in Verilog.
    11·1 answer
  • Find 10 real world challenges and their corresponding solutions
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!