1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Degger [83]
2 years ago
10

Select the correct answer.

Computers and Technology
1 answer:
Katen [24]2 years ago
3 0

Answer: D

Explanation: I don't know I hope u get it right

You might be interested in
What is the difference between edge and core networks?
Dmitriy789 [7]

Answer and Explanation:

Difference between core network and edge network:

  • Core network is also known as the backbone network whereas edge network stands for enhanced data rate for global evolution
  • Core network provides the path for exchanging the information between different sub networks,whereas edge network provide information exchange between excess network and core network

6 0
3 years ago
Which function should be used to display a value based on a comparison?
Kamila [148]

Answer:

B. IF function should be used to display a value based on a comparison.

7 0
3 years ago
A ___________ is a variable used to pass information to a method.
Sauron [17]

A <em>parameter </em>is a variable used to pass information to a method.

3 0
2 years ago
Read 2 more answers
Which of the following is NOT a data type in Python?<br> integer<br> decimal<br> string<br> float
VashaNatasha [74]
Decimal (i think but i’m not 100% sure)
7 0
3 years ago
The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
lawyer [7]

Answer:

IDP sensors can be complicated.An open-source software program called snort program.

Explanation:

Snort is an open-source network intrusion detection system (IDS) and prevention system. It is created in 1998 by Martin. Snort's open source network-based can perform analysis and packet logging on an Internet Protocol network.

The snort program can be used to detect probes or attacks. Snort configured three modes

sniffer

pocket logger

network intrusion detection.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What is microsoft excel
    12·1 answer
  • You press the power button in order to start your computer but hear nothing and see nothing. Name 2 possible reasons for this.
    6·1 answer
  • Why might a government entity choose to offer some information and services online as in e-government
    8·2 answers
  • Operational feasibility, which refers to user acceptance and support, as well as management acceptance and support, is also know
    9·1 answer
  • Which steps allow a user to change the column layout in the Handout Master?
    9·1 answer
  • What is gender bias?
    9·1 answer
  • It takes 2.5 yards of material to make a dress harleys clothing design estimates that they can produce 48 dresses each week.if t
    15·2 answers
  • 9. DIMMs used in servers can provide additional reliability if they use what specific technology.
    8·1 answer
  • Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
    13·1 answer
  • Whats the formatting of a letter to the editor?​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!