1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
taurus [48]
2 years ago
14

1. The running configuration is also known as the _____________ (Select Two) a. Startup config b. Working configuration c. Curre

nt configuration d. Backup configuration
Computers and Technology
1 answer:
Shtirlitz [24]2 years ago
6 0

Answer:

1. The running configuration is also known as the <u><em>b. working configuration</em></u>

<u><em>c. current configuration</em></u>

Explanation:

hopes this help (:

You might be interested in
Compare and contrast between Client/Server and Peer-to-Peer networks. What are some of the business benefits of using such netwo
fgiga [73]
Client/Server and Peer-to-Peer networks are the two major network architecture models in use today. They each have advantages and disadvantages that can be used to benefit a particular outcome.

Briefly, the client/server model relates to one or many client performing relatively simple requests, which are then executed by a server. The server is performing more complex tasks, and often interacting with many clients simultaneously. Examples of client/server models include most websites, including the Brainly page you are running right this instant. Your web browser is acting as a client, and the Brainly.com website is running as a web server. It receives simple requests or information from your browser, such as clicking on a question or text typed by your keyboard, and then acts on this information by consulting a database, returning values, or returning a whole new web page to your browser. The client/server model is very powerful in business as it allows powerful and secure server-side processing and relatively simple clients. Office 365 that runs all microsoft office suites such as word and excel in a web browser on 'the cloud' is an example of a highly sophisticated client/server architecture.

By contrast, peer-to-peer networks are a distributed architecture of equals. Instead of a simple client and complex server, all clients are equals and link together to form nodes on a distributed network. There is no central control (server) and each node acts as a client and server to other nodes. This is also an extremely powerful network; as there is no central control it is difficult to shut down a peer-to-peer network. Taking out one node will not break the network in comparison to the client/server architecture where if the server goes down, services halt. Prime examples of famous peer-to-peer networks are the Bitcoin network and similar cryptographic currency networks, and music and file sharing networks such as Torrents. The torrent tracker websites are client/server however once a torrent is loaded into a torrent downloading application, the file is collectively downloaded from hundreds of 'peers' across the world as part of the torrent peer-to-peer network.


3 0
3 years ago
Hyper-inflation is where prices rise dramatically over a short period of time. What is the cause given for cases of hyper-inflat
Nikitich [7]
The answer would be B. Printing too much money so it looses its value
8 0
2 years ago
Read 2 more answers
A(n) _____ is used to create a new file or to overwrite an existing file by attaching it to a command that produces output.
Alex787 [66]

Answer: Redirection symbol

Explanation: Redirection symbol/operator is the special operator that is used in programs along with commands. The operators that are generally used are ">",">>","I" and "<". These commands are given in the section of the DOS commands and other command prompt sections. This is the process where the changes in input feed and output is  analyzed and read through these commands.

3 0
3 years ago
This resource is a collection of 20,000 detailed job profiles. O*NET, the online version of the DOT, is a database of job profil
Digiron [165]

Answer:

The ONET database holds data or details of job profiles available to applicants on the internet.

Explanation:

A database is an important tool in web development. Commercial or e-commerce websites use databases to store important information needed by the customers to make purchases of goods and services.

Other websites like government agencies and research communities use these databases to collect and store data retrieved from visitors to the sites.

5 0
2 years ago
On which side of the keyboard is the numeric keypad usually located
Rina8888 [55]

Numeric keypad. Alternatively referred to as the 10-key, number pad, numeric keyboard, numpad, or ten key, the numeric keypad is a 17-key keypad usually found on the far right side of a standard PC keyboard

6 0
3 years ago
Read 2 more answers
Other questions:
  • Again, consider what you believe to be the goal of performing a penetration test. Why would you worry about doing any privilege
    14·1 answer
  • The set of appearance choices for files and folders is known as the
    7·1 answer
  • ___ Jacking is a crime that takes place when a hacker misdirects URL to a different site. The Link Itself Looks Safe, But the us
    11·1 answer
  • Contemporary Information Systems are interfacing with customers andsuppliers using:A. Electronic commerceB. CRMC. SCMD. all of t
    9·1 answer
  • Write an application that reads the lengths of the sides of a triangle from the user. compute the area of the triangle using her
    11·1 answer
  • Implement a sublinear running time complexity recursive function in Java public static long exponentiation (long x, int n) to ca
    14·1 answer
  • You dad has given you his old digital scanner for your new computer. you plug it into the usb drive on your windows 8 computer b
    8·1 answer
  • Before you can use a navigation control, you must _____. A. configure the web.config B. configure the global.asax C. configure t
    5·2 answers
  • Which of the following are logical reasons for using a pie chart to show how employees spend their time at ABC organization? Cho
    14·1 answer
  • In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyon
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!