1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
9

Brainless is one the way if you help

Computers and Technology
1 answer:
V125BC [204]3 years ago
3 0

Answer:

1. x - 6

2. p - ? = 7

i chose these equations because

a number - 6 = the weight of your backpack.

p - an unknown number without a substitute variable = slices of bread left.

You might be interested in
This isn't school related but if I get a 2 month free plan and it is expired and I don't have a card attached to my account will
Nadusha1986 [10]

Answer:nothing will change but you are going to have to stop the subscription when the two months are over. That’s if you don’t want to pay for another month

Explanation:

3 0
3 years ago
HELP ASAP WILL GIVE BRAINLY Question 19 Multiple Choice Worth 5 points) (05 03 MC) Network technologies specialist Hannah has be
nasty-shy [4]

Network technologies specialist Hannah would need to configure: C. RIP version 2 using Internet Protocol Version 4 (TCP/IPv4).

<h3>What is RIP?</h3>

RIP is an acronym for Routing Information Protocol and it can be defined as an intradomain routing protocol which is typically designed and developed based on distance vector routing.

<h3>The types of RIP.</h3>

In Computer networking, there are two main types of Routing Information Protocol (RIP) and these include:

  • RIP version 1.
  • RIP version 2.

RIP version 2 are generally designed and developed to include subnet masks unlike RIP version 1. Thus, Hannah would need to configure RIP version 2 using Internet Protocol Version 4 (TCP/IPv4) allow several machines on different subnets to communicate with each other using broadcasts.

Read more on routing protocol here: brainly.com/question/24812743

4 0
3 years ago
A particular BI analysis might require data from an ERP system, an e-commerce system, and a social networking application, but s
maxonik [38]

Answer:

Data not integrated.

Explanation:

The Integration of data is the method of integrating data from various outlets into one consistent, coherent view.Integration starts  with the process of intake, which involves steps such as washing, ETL simulation and integration.

The data which is not represent  primary key/foreign key  relationship such a data is known data not integrated In this given question the BI is analysed the data from the ERP system and other from e-commerce system as well as from networking application the data is not described in primary key/foreign key relationships this kind of data is known as data not integrated .

8 0
4 years ago
Please help me!! 10 Points are waiting!!
prisoha [69]

Google

https://google.com

Google has a large index of keywords and where those words can be found. Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

3 0
3 years ago
1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
enyata [817]

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

4 0
3 years ago
Other questions:
  • The source ip address is 164.109.28.3 subnet mask of 255.255.128.0 network address is
    7·1 answer
  • The =COUNT function calculates what value?
    5·2 answers
  • The general manager for a retail clothing outlet was recently cited as saying, IT is the cornerstone of our company. All of our
    9·1 answer
  • How to change font size and style and add a table when creating a webpage?
    6·1 answer
  • Which of the following is an individual’s social equals?
    6·1 answer
  • Which line in the following program contains the prototype showDub function? 1 #include 2 using namespace std; 3 void showDub(in
    12·1 answer
  • Dell Computers is a nationally recognized manufacturer of computers for the small business and home markets. If Dell were to ord
    9·1 answer
  • If someone wanted to talk to a financial institution representative in person they would need to _____.
    5·1 answer
  • Who prime minister of india​
    9·2 answers
  • Which key must be pressed in addition to clicking on a hyperlink for it to be followed?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!