1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nlexa [21]
3 years ago
10

❤️❤️❤️❤️❤️❤️❤️❤️IS THERE ANYONE'S STILL AWAKE?? HMM HEHE I'M HERE AGAIN~~~ FOLLOW ME FOR MOR3~~​

Computers and Technology
2 answers:
Anettt [7]3 years ago
4 0

Answer:hi

Explanation:

insens350 [35]3 years ago
3 0

Answer:

hello?

Explanation:

You might be interested in
Which two tasks are associated with router hardening? (choose two.)?
nexus9112 [7]

Disabling unused ports and interfaces.

Securing administrative access.

Router hardening means that the router is secured against attacks as best as possible. Router hardening is one among the three areas of router security that must be maintained to secure an edge router at the network perimeter. Basically, router hardening secures from tough-to-crack passwords, to the shutting down of unnecessary interfaces, ports, and services. Look for any unused router interfaces and disable them by issuing the shutdown command. Disabling unused services typically include BOOTP, CDP, FTP, TFTP, PAD, and a few others. You can also disable administrative and management protocols currently not being  like HTTP or HTTPS, DNS, and SNMP.

8 0
3 years ago
An agile team used planning poker to estimate user stories. After all team members read a user story, the facilitator asks every
Natali [406]

Answer:

The answer is "Option B"

Explanation:

In the given-choices, the only option B is correct because by reassessing instantly, the team loses is its advantage of debating its projections and how it chose those assessments, and the wrong choice can be defined as follows:

  • In choice A, Mostly as a unit for the projections, respondents should not use the ideal days.  
  • In choice C, Whenever the procedure should've been anonymous, no cards were released.
  • In choice D, Its mediator was incorrect and the laws were followed.
4 0
3 years ago
The following statements regarding centralized administration concepts are presented to you in an interview in which only one of
max2010maxim [7]

Answer: B

Explanation: The extensible authentication protocol (EAP) is a framework that is used to transport authentication protocols.

6 0
2 years ago
Write 5 things that are key to writing a email.
Hitman42 [59]

Answer:

5 steps to writing an email-

Salutation

Subject

Professional

Sign

Keep it to the points

8 0
3 years ago
A(n) _____ website gathers, organizes, and then distributes web content.
kap26 [50]

Answer:

content aggregator

Explanation:

:)

8 0
3 years ago
Other questions:
  • Complete main() to read dates from input, one date per line. Each date's format must be as follows: March 1, 1990. Any date not
    9·1 answer
  • Without a(n) ____, a computer cannot function.
    8·2 answers
  • It is important to create an IT security program structure that aligns with program and organizational goals and describes the o
    6·1 answer
  • Gus has decided to organize his inbox on June 26th by using folders and deleting irrelevant messages
    10·2 answers
  • All of the following statements concerning project portfolios are true EXCEPT: ​ a. The projects in a portfolio are managed as a
    6·1 answer
  • Lets computer know what to do when it starts up...
    9·1 answer
  • hey guys. I have bitmoji but the stickers just won't load. it says 'we couldn't retrieve you stickers, or says an error message.
    5·1 answer
  • How do I give Brainliest?? I'll give brainliest...
    13·2 answers
  • Function of Ribbon in Access 2010​
    7·1 answer
  • A flowchart meeting is a process where members of the team analyze the design piece-by-piece to make sure it meets requirements
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!