1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
2 years ago
11

Answer this if you can help me!

Computers and Technology
2 answers:
kobusy [5.1K]2 years ago
7 0

Answer:

dsaxd

Explanation:

andrezito [222]2 years ago
5 0
Sure! Why not? I would love to help answer a question , as long as it’s not cheating! ☺️
You might be interested in
Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and
makkiz [27]

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

7 0
3 years ago
PL I BEG YOU HELP
Murrr4er [49]

Answer:

Answers in explanation. Try to ask one question at a time, it is easier for people to answer single questions and you will get answers faster.

Explanation:

15. A

16. D

17. B + C

18. A+B+D

19. B+C+D

**20. is NOT Planned personal leave for documentation developers and proof readers. The other 4 answers are correct

21. Presentation notes + Outline

22.B

23.D (im not entirely sure about this one)    

8 0
3 years ago
The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval
jarptica [38.1K]

Answer:

hello your question has missing options below are the missing options

A. Monitor all traffic using the firewall rule until a manager car) approve it.

B. Immediately roll back the firewall rule until a manager can approve it

C. Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

D. Have the network team document the reason why the rule was implemented without prior manager approval.

answer : Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible. ( C )

Explanation:

A good step to have in the procedures of a situation like this is

Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

4 0
3 years ago
Consider a pipelined than can issue up to one instruction per cycle, but fewer may be issued because of pipeline hazards, multi-
a_sh-v [17]

Answer:

Achieved Instruction per cycle rate is 4.11\times 10^{15}

Solution:

As per the question:

Execution time, t = 1.4 s

No. of instructions being executed, n = 1.8 billion =

Clock speed of CPU, f = 3.2 GHz = 3.2\times 10^{9} Hz

Now, to calculate the actual issue rate achieved:

CPI (Cycle per Instruction) = \frac{t}{n\times f}

CPI = \frac{1.4}{1.8\times 10^{6}\times 3.2\times 10^{9}}

Instruction per cycle is given as the reciprocal of CPI:

Instruction per cycle = \frac{1.8\times 10^{6}\times 3.2\times 10^{9}}{1.4} = 4.11\times 10^{15}

6 0
3 years ago
____ was developed to enable web authors to implement interactive content on web sites, such as to animate an item, or pop up a
Gnesinka [82]
HTML (Hypertext Markup Language) was developed to enable web authors to implement interactive content on web sites, such as to animate an item, or pop up a window to point to an item. HTML is a standardized system, a program language for creating web sites that t<span>ells the Web browser how to display a Web page's words and images for the user.</span> It is the fundamental language used to develop webpages.


4 0
3 years ago
Other questions:
  • Categorize the following relationships into generalization, aggregation, or association. Beware, there may be n-ary associations
    14·1 answer
  • What does a spam e-mail normally promise you?
    9·1 answer
  • You are driving on expressway with three lanes in your direction at a speed lower then
    8·2 answers
  • What is a difference between a waxing crescent and a waning gibbous? (1 point) waxing crescent: first quarter waning gibbous: th
    11·1 answer
  • Queremos conectar una pila de 4,5 V a un diodo LED cuya tensión de trabajo es de 2 V. Calcula cuál debe ser el valor de la resis
    8·1 answer
  • for java ?(Business: check ISBN-13)ISBN-13 is a new standard for identifying books. It uses 13 digits d1d2d3d4d5d6d7d8d9d10d11d1
    9·1 answer
  • How many clients has<br> Accenture engaged globally on blockchain?
    12·1 answer
  • Ways to be your best digital self?
    7·1 answer
  • How does your ability to correctly count change affect the impression the customer has of you?
    8·1 answer
  • how could environmental and energy problem Kenya faces as far computer installations are concerned be avoided​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!