1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miv72 [106K]
2 years ago
13

Please help me on this match all this up i’ll give you brainlist

Computers and Technology
2 answers:
Tresset [83]2 years ago
8 0

Answer:

its in the picture

PtichkaEL [24]2 years ago
4 0

Answer:

biology teacher= education and training

court clerk= government and public administration

ship engineering= transportation,distribution and logistics

marriage and family therapist= human services

web developers= information technology

You might be interested in
Suppose that the host with IP address 10.0.1.19 sends an IP datagram destined to host 128.119.160.183. The source port is 3324,
Slav-nsk [51]

Answer:

The source and destination IP addresses are 10.0.1.19 and 10.0.1.25

Explanation:

NAT or network address translation is a network protocol is used by private networks to access the internet by assigning or mapping a public IP address to the private addresses.

The host with IP address 10.0.1.19 searches for the actual destination IP address 128.119.160.183 in its private network and when it does not find it, it sends the packet to the default gateway IP address 10.0.1.25, which is where the private IP address is NATted and sent to the destination.

5 0
3 years ago
AFLAC, Inc. recently implemented a company policy that all new IT projects must be coordinated and approved by the project manag
Shkiper50 [21]

Answer:

Option (E) is the correct answer to the following question.

Explanation:

Because it helps AFLAC Inc. company to run their project in a more easier way and it also helps its employees to work fast on their new IT projects by installing a WiFi network in their ALFAC inc. branch office. So, that's why they have to install a wireless network.

And the other option is not applied because these activities have to be done in all projects if the project is important either not.

8 0
3 years ago
Picture question please help me
cluponka [151]

Answer:

where is the picture?????

6 0
2 years ago
Read 2 more answers
1.Discuss the differences and similarities between a peer-to peer network and a client server network.
irga5000 [103]

Answer:

dsdasd1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

Explanation:

jaiusfkybuetcrjnwxyefshrcxijkwuecvashcnzx

5 0
3 years ago
The main workspace of a Windows computer is called the______
andrew11 [14]

Answer:

Desktop

Explanation:

8 0
3 years ago
Other questions:
  • Which of the following loop conditions will read all the data in the file assuming that each line in the file contains two integ
    5·1 answer
  • The variable used in a loop to control the number of times it is executed is called a _______.
    10·1 answer
  • Which of the following types of network can only be accessed by members within a private organization?
    5·1 answer
  • How would you classify an employee who is punctual, has respect for oneself and others, and takes initiative?
    13·2 answers
  • The M:N relationship between STUDENT and CLASS must be divided into two 1:M relationships through the use of the ENROLL entity;
    10·2 answers
  • Many commercial encryption programs use a technology called ____, which is designed to recover encrypted data if users forget th
    12·1 answer
  • Which 1898 film did George Melies create using camera trickery to create a illusion in which we now
    11·1 answer
  • How many of yall are willing too sub to my channel called "Space Juice" with around 200 subs?!​
    6·1 answer
  • 8. What is the order of growth execution time of the push operation when using the LinkedStack class, assuming a stack size of N
    13·1 answer
  • Suppose in an Excel spreadsheet, the value in cell A1 is 25. By using the Macabacus local currency cycle shortcuts (Ctrl + Shift
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!