1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
2 years ago
12

(40 PTS) Be specific

Computers and Technology
1 answer:
White raven [17]2 years ago
8 0

Answer:

Take a knife. Cut the bread. Open the jar of peanut butter and jelly. Scope of a big chunk of peanut butter and

You might be interested in
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
AnnZ [28]
Distributed Denial of Service /<span> </span><span>DDoS</span>
4 0
3 years ago
If you specify a user without specifying a hostname, mysql will
ruslelena [56]
<span>If you specify a user without specifying a hostname, mysql will </span>automatically put a percent sign (%) the host to show that the user can connect from any host.
3 0
4 years ago
What do you call a commercial transaction beyween a buisness and buisness thatis transactedd online?
VMariaS [17]

Answer:

c.B2b digital transaction

Explanation:

yan lang po sana makatulong

6 0
3 years ago
Question 2 (2 points)
swat32

I beleive all of the above for question one

4 0
3 years ago
60 POINTS!! WILL MARK BRAINLEST!!
polet [3.4K]

design of the network

security for the network

documentation

identifying and fixing issues

8 0
3 years ago
Other questions:
  • Anna always has a hard time finding files on her computer because she does not know where she saved them. This also affects her
    12·2 answers
  • The computer mouse is used to
    7·1 answer
  • How many arguments are required for the sum function?
    15·1 answer
  • Managing your calendar and emails can be easily accomplished through ___ software
    8·1 answer
  • Place the steps in order to link and place text into the document outline, effectively creating a master document.
    8·1 answer
  • The methods in a subclass can use all of the data fields and methods that belong to its parent, with one exception: ____ members
    11·1 answer
  • The nl2br() function can be used to convert new line entries in a text area into html ________________ tags.
    13·1 answer
  • Which of the following methodologies might be most appropriate if you have a system project with:unclear user requirements; unfa
    12·1 answer
  • The best way to help prevent a system from a worm attack is to use anti-virus software anti-malware software a firewall a router
    12·1 answer
  • What can be used to help diagnose and fix computer hardware problems?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!