A collection of computers, printers, routers, switches, and other devices
that can communicate with each other over some transmission medium
O network
O host part
subnet part
subnet

Answers

Answer 1

ermano envia foto de lo que necesitas yo te ayudo


Related Questions

Why might be one reason a stock becomes more valuable over time?
A. The industry is growing
B. The company is well managed
C. There’s a lot of demand on the product
D. All of the above

Answers

The answer is D all of the above
D all of the above.

the contents in cells are A1 through A6 are 6,3,4,7,9 and 7. What function would return the answer 6?​

Answers

Answer:

The formula =AVERAGE(A1:A6) would return the average of those numbers which is '6'.

Explanation:

The content in cells is A1 through A6 are 6,3,4,7,9 and 7.

As the average of 6,3,4,7,9 and 7 is 6.

If the range A1:A6 contains numbers, the formula =AVERAGE(A1:A6) would return the average of those numbers.

Therefore, the formula =AVERAGE(A1:A6) would return the average of those numbers which is '6'.


a.
Define a computer with its proper meaning.​

Answers

Answer:

Computer

Explanation:

a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations.

Answer:

computer

Explanation:

An electronic machine that processes, stores data, and does calculations.

Someone plz im begging for ur help plzz??

Answers

Answer:

woah what subject is this-

Explanation:

HOW CAN A PERSON GET BENEFITTED BY THE ICT BASEDSERVICES PROVIDED BY GOVERNMENT

Answers

Answer:

Explanation:

It aims to transform the entire ecosystem of public services through the use of information technology.ICT holds particular promise in areas of governance and public participation.  Age can use information to reduce corruption and increase government transparency, accountability, efficiency and so finally gud night guys and take care.

plz mark as brainliest

Order the steps for accessing the junk email options in Outlook 2016
Select Junk Email Options
Click the Junk button
Select a message
Choose one of the protection levels
Locate the Delete group on the ribbon​

Answers

Answer:

To access the the junk email options in Outlook 2016, follow the following steps.

1. Click the Junk Button

This will take you to the Junk messages that you have.

2. Select a message

Select a junk message from the list.

3. Locate the Delete group on the ribbon

The Junk email options is located in the 'Delete' group on the ribbon in the Home tab.

4. Select Junk Email Options

Click on the Junk email options button and a popup window will appear.

5. Choose one of the protection levels

Select the protection level you want from the various options listed including low, high, automatic etc.

Answer:

select a message, locate the Delete group on the ribbon, click the junk button, select junk email options, choose one of the protection levels.

Explanation:

Please help.

Why I'm I getting a syntax error.

Answers

In python, the word list is a keyword. It's not meant to be used for a variable. Try changing list to lst. There also might be other parts wrong with your code. If we could take a look at your whole function, we could determine if there is anything else wrong with your code.

Select the correct answer from the drop-down menu.
Chrissie shirks the additional work given to her.
She lacks the trait of

Answers

Answer:

Responsibility

Explanation:

50 PTS
in Java
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.

The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.

Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn’t in one of those Strings, then it’s an illegitimate password!

Answers

import java.util.Scanner;

public class JavaApplication46 {

   public static boolean passwordCheck(String pass){

       String alphanum = "abcdefghijklmnopqrstuvwxyz1234567890";

       boolean legit = true;

       if (pass.length()>= 8){

           for(int i = 0; i < pass.length(); i++){

               if (alphanum.indexOf(pass.charAt(i)) != -1 && legit != false){

                   legit = true;

               }

               else{

                   legit = false;

               }

           }

       }

       else{

           legit = false;

       }

       

           return legit;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.print("Enter a password: ");

       String password = scan.next();

       System.out.println(passwordCheck(password));

   }

   

}

I hope this helps!

Any application that wants to be displayed on the web must use the HTTP protocol
True
False

Answers

Answer:

true

Explanation:

Justify the use of an e-diary in the organisation of the meeting.

Answers

Answer:

It can be used to easily organize stuff

Explanation: It can be easily used to organize meetings & write important stuff, and you will also never run out of pages, which is better than having no diary.

Which entity might hire a Computer Systems Analyst to help it catch criminals?

a law enforcement agency controlled by the government
a private investigator who used to work for the government
a credit card company that does business with the government
a financial management firm with ties to the government

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is:

A law enforcement agency controlled by the government might hire a Computer System Analyst to help it catch criminals.

Because only law enforcement agency that is under control of government allows in any country to catch criminals. So, in this context the first option is correct.

While other options are not correct because:

A private investigator who used to work for the government does not need the services of a computer system analyst, because he may be assigned only one assignment. And, his purpose is to perform duty and complete the assignment. A credit company also does not allow the Government in any country to catch the criminal. A financial management firm also not allowed to catch the criminal, so in this context, only a law enforcement agency controlled by the government is allowed to catch the criminal. So, the first option of this question "a law enforcement agency controlled by the government" is correct.

Answer:

A

Explanation:

¿En cuales situaciones concretas se puede aplicar las técnicas de conteo(particularmente las permutuaciones y las combinaciones) dentro de la informática?

Answers

Answer:

In which specific situations can counting techniques (particularly permutuations and combinations) be applied within computer science? for anybody trying to help

While an image is still being editing, it is best to save it as a PDF. Group of answer choices True False

Answers

Answer:

f

Explanation:

No because when you save it, the new editing will not count.

Describe how each command is used by matching the command to its purpose.
removes data fror
places it on the cli
Paste
cancels a previou
Undo
restores a previou
Copy
duplicates data a
clipboard
Cut
Redo
places data in its

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

The correct command matches its use are given below:

Paste   Places data in its

Undo   Cancel a previous

Copy    Duplicates data on the clipboard

Cut       Removes data for places it on the clipboard

Redo    restores a previous

Paste term is used when you are placing copied data. Undo is used to cancel a previous action performed while Redo is used to restores a previously performed action. The copy is used to duplicate data on the clipboard while Cut is used to removes data for places/ to paste somewhere else.

Plagiarism occurs when writers

use others’ ideas and writing as their own.
exclude a bibliography from their work.
include direct quotations from others.
use others’ work as inspiration.

Answers

Answer:

A- Use others' ideas and writing as their own

Explaniation:

it's plagiarism, just don't take other people's work and pass it as your own. smh lol

Answer:

Just so I don't get reported for copying I will tell all the answers that are not right.

Explanation:

B.

C.

D.

Hope this helps.

Who you think is better? Ninja or TFue ,btw do you know who icebear is?

Answers

Answer:

no, no i dont think i will.

Explanation:

Which best describes what a works-cited list includes?

sources found during research
sources cited in a paper
sources quoted in a paper
sources examined during research

Answers

Answer: Sources cited in a paper

Explanation:

Answer:

B

Explanation:

You have to match the letter nexts to the numbers

Answers

Answer:

Word is for business letter 4+a

2+c Monthly budget expenses

3+b is for presentation

1+d department store inventory

The meaning of docile can be determined by the... context clue. synonym atonym or explanation

Answers

Answer:

Synonym

Explanation:

I'm pretty sure it's either synonym or explanation, but if there isn't an explanation, it's almost always synonym... so... synonym is correct.

Answer:

it is explanation

Explanation:

trust me

how to take a pic with a cumputer

Answers

Answer:

Ctrl+Shift+4

Explanation:

Answer:

Use Snip+Sketch on your taskbar

It looks like this~

what format can be applied to text in excel?

Answers

You can apply accounting format,date,numbers, currency, percentage or even fraction

I need help pleaseeee

Answers

Answer:

The Answer is C. Hope you get it right, Good Luck!!!

Answer:

The answer is B

Explanation:

To create a list, paragraph, or unordered list, you should use HTML code, whereas in CSS coding, you can change the overall font size of a tag using the font-size=(number) tag.

where can you apply the hand wire splicing technique

Answers

Answer:

When you want to extend an electrical wire for an apparatus, e.g., a lamp or a speaker.

The Quick Access tool bar allows you to customize the actions or commands you frequently use.

True
False

Answers

I believe its true.

. Write a Python command to assign the value 80.35 to a variable called 'point'.

Answers

Answer:

point=80.35

Explanation:

where to buy a ps5
I really want one please help meh

Answers

Answer:

You can buy one at gamestop, target, walmart, best buy and probably more stores

Answer:

Amazon, walmart, target, gamestop?

Explanation:

I'm sure a quick go ogle search will get u what u want to see, have a nice day and I hope u get what u want!

Which component in a CPU is responsible for transferring
data from one functional component to another?​

Answers

The data bus carries data from components to others

ABC IF U HAVE A LEGENDARY PET ON ADOPT ME OR ANYTHING COOL!! <3

Answers

Answer:

ABC PLEASE

Explanation:

Answer:

ABC i have mega owl and neon cow and mega frost <3

CSS is a language that controls the way content on a web site appears. It uses_______ _____to
change the look of a page.

Answers

Answer:

I'm not sure what the answers are, but when someone is making a website from scratch, they tend to use CSS HTML and JS(javascript)

hope i helped ;)

Other Questions
When was Olympia founded?1827184518481850BEING TIMED PLS PLS PLS HELP THIS IS AN ALGEBRA 2 QUESTION is 0.5 or 17/34 greater What kind of evidence is given for the claim made in the paragraph? differences between Brazilian rhythms and Cuban based rhythms.Music is considered a type of art right? How did completion of the Ernie canal in 1825 affect United States commerce? johns dog eats 4/5 tin of mince meat added in his meal every day . if dog eats 35 full tins of meat in one week(7 days) then how much does it eat every day. 15+10f=-12 does someone knows this one? Convert 4/7 to 42nds 1. Discuss the statement 'State-owned enterprises perform as expected of them.' What is the first letter of the alphabet MATH MATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATHMATH Is water renewable or non-renewable?yes or no?explain: Which sentence from the paragraph contains the bestuse of domain-specific vocabulary?Shakespeare's writing style reveals information aboutattitudes toward the landscape. His precise word choice provides detailed descriptions of the outdoors. In Titus Andronicus, he uses words like "ruthless," "vast," and gloomy" to describe forests. Although he is known as the "playwright's playwright," Shakespeare could have been a travel guide. A. Shakespeare's writing style reveals information about attitudes toward the landscape. B. His precise word choice provides detailed descriptions of the outdoors.C. In Titus Andronicus, he uses words like "ruthless,""vast," and "gloomy" to describe forests.D. Although he is known as the "playwright'splaywright," Shakespeare could have been a travelguide.(I know the right answer is B, but there was another question that was like this one with the wrong answer) An automobile travels a displacement of 75 km at 45 degrees north of East. How many kilometers north does it travel? I dont understand this On the set of axes below, triangle ABC is graphed. Triangles A'B'C'and A"B"C", the images of triangle ABC, are graphed after asequence of rigid motions. 13 Apply Place a check mark in the box to indicatewhich type of mutation is being shown.Original sequencedeletion insertion substitutiondeletion insertion substitutiondeletion insertion substitution Which two show that onions are not non living and in fact are living - they respond to stimuli-engage in movement -able to reproduce - use energy Find the perimeter of each figure.