Computers and Technology, 14.10.2019 19:30 felicianorman97
Suppose computer a is sending a message to computer b which is on the same network as computer a. what layer 2 and 3 source and destination addresses will be used in the communication process? how would that be different if computer b was on a different network than computer a?
Answers: 1
Computers and Technology, 23.06.2019 01:30
Jason works as an accountant in a department store. he needs to keep a daily record of all the invoices issued by the store. which file naming convention would him the most? a)give the file a unique name b)name the file in yymmdd format c)use descriptive name while naming the files d)use capital letters while naming the file
Answers: 3
Computers and Technology, 23.06.2019 02:30
Rafael needs to add a title row to a table that he has inserted in word. what should he do? use the alignment options. use the merge and center option for all the cells in the top row. use the merge and center option on the first two cells in the top row. none of the above
Answers: 3
Computers and Technology, 23.06.2019 04:31
Q13 what function does a security certificate perform? a. creates user accounts b. scrambles data c. identifies users d. creates password policies e. provides file access
Answers: 1
Computers and Technology, 23.06.2019 12:30
Animations and transitions are added from the
Answers: 1
Suppose computer a is sending a message to computer b which is on the same network as computer a. wh...
Mathematics, 18.03.2021 03:30
English, 18.03.2021 03:30
English, 18.03.2021 03:30
Mathematics, 18.03.2021 03:30
Chemistry, 18.03.2021 03:30
History, 18.03.2021 03:30
Mathematics, 18.03.2021 03:30
Mathematics, 18.03.2021 03:30
Mathematics, 18.03.2021 03:30