1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
belka [17]
2 years ago
6

In his article, “How to Publish Without Perishing,” what does James Gleick believe most people do when they really read a book?

Computers and Technology
2 answers:
sukhopar [10]2 years ago
7 0
The answer to this question is definitely C.
jonny [76]2 years ago
3 0

Answer:

James Gleick believes that they immerse themselves in a rich textual world. The answer is C.

You might be interested in
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
1. A formula =A1+B2 is in cell D8. If you copy that formula to cell D9, what is the new formula in cell D9?
MaRussiya [10]
1. Answer is B   (D9=<span>A2+B3)
2. </span><span>C. identifies how many cells with data were in the range 
3. </span><span>A. ascending (smallest to largest)
</span><span>4. A. the current worksheet </span>
6 0
2 years ago
PLEASE HELP!!!
uysha [10]
The next line is 0___________________________
3 0
2 years ago
The Distribute commands will evenly distribute the rows and columns within what? The width and height of the document. The width
Maksim231197 [3]
The answer is (C), The width and height of the table

When formatting a table, for instance, you may want the columns to have similar width without interrupting the width of the table. If you are using Microsoft word 2000, 2002 or 2003, you should select the table itself; choose Table option, Autofit, and then select Distribute columns evenly. If using word 2007 and Later, you should select the table and this will display the Layout tab. Click the Distribute Columns option tool.

4 0
2 years ago
The accounting number format function is contained within the __________.
bija089 [108]
The accounting number format shows numbers with a dollar sign on one side of the number, embeds a comma each three positions to one side of the decimal point, a presentations numbers to the closest cent. Hope this will help.
8 0
3 years ago
Other questions:
  • Human systems integration (hsi), a supportability issue that every program should consider, addresses such factors as accessibil
    10·1 answer
  • I NEED HELP NOW PLEASE!!!!!!
    6·2 answers
  • What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130
    10·1 answer
  • Write a program that allows two players to play a game of tic-tac-toe. Use a two dimensional char array with three rows and thre
    7·1 answer
  • With a presentation open, you can hover your mouse pointer over a design theme on the Design tab, and PowerPoint will display th
    14·1 answer
  • A ___________ variable is used to add up a set of values. fill in the blank
    8·1 answer
  • Which statement about intellectual property is true? (CSI-7.6) Group of answer choices It is okay to use code you find on the in
    14·1 answer
  • In which program structure does the processor verify the mentioned condition only after executing the dependent statements once?
    8·2 answers
  • Any idea how to make my simple python projects such as guess the number, mad libs, etc. even better?
    15·2 answers
  • A cookie is stored on your device's memory or disk in what file format? 1.)video file
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!