Answers

Answer 1
Answer:

Answer:

transforming or moving 1 or more layers

Explanation:

hope it helps


Related Questions

Which are *four* best practices used in the access layer? a. Disable trunking in host ports. b. Limit VLANS to one closet. c. Use PVST+ as the STP with multilayer switches. d. Enable trunking on host ports. e. Use VLAN spanning to speed convergence of STP. f. Use VTP Server mode in hierarchical networks. g. Use VTP Transparent mode in hierarchical networks. h. Use RPVST+ as the STP with multilayer switches.
Which of following options opens a program, folder, document, or a Web site?a. All Programs b. Run c. Control Panel d. Start
_________ is an organized portfolio of formal systems for obtaining processing and delivering information in support of the 4 operations and management of an organization. Options MIS DSS MRS None of the above
PLEASE HELP FIRST ONE TO ANSWER WILL GET BRAINLIEST!!Develop a brief problem and purpose statement for the following scenario.Situation: A counseling program at a large local high school seeks to help students cope with loss, divorce, or death. The program currently advertises optional group meetings open to everyone. At these meetings, students are asked to stand up in front of the group and talk about their experiences. The coordinator of the program observes that attendance is very low, and that students are reluctant to say much when asked. The coordinator asks you to investigate the situation.
Web browsers are used to browse the World Wide Web. True or false

If you want to refine your Google search results by date, which option should you use?A. Advanced search

B. Safe search

C. Simple search

D. News search

Answers

A. Advanced Search. It lets you filter results.
The answer is A) advanced serach

Mechanisms that combine memory, processing speed, and knowledge to regulate the analysis and flow of information within the information-processing system are referred to as _____.

Answers

Answer:

control processes.

Explanation:

Mechanisms that combine memory, processing speed, and knowledge to regulate the analysis and flow of information within the information-processing system are referred to as executive/control processes.

11.The inhabitants of Easter Island overused their resources, and

they moved onto house boats in the Pacific Ocean.

they adapted to using more aquatic resources.

their population crashed.

they moved to another island.
12.
When a body of water is lacking in oxygen, it is called a ______.

carbon dioxide zone

dead zone

fishing zone

hot zone
13.
All green buildings are:

made from recycled materials

use solar energy

energy efficient

painted green

Answers

11. their population crashed.

12. 
dead zone

13. I believe 
energy efficient

If a driver who is under the age of 21 is stopped by a law enforcement officer and shown to have a BAL of .02 or greater, he or she will have his or her driving privilege suspended for ________.

Answers

its actually BAC (clood Alchohol Content) and  it dependsn on what state you live in, and usually first time offenders with a BAC over 0.15 will have their license suspended for 90 days. but again it depends on the state. and anything below a 0.08% will just result in a warning but what state is it?

Identify the parts of a spreadsheet by using the drop-down menus to select the part that corresponds to the labeled diagram to the right.A

B

C

D

E

Answers

Answer:

A- Row

B- Column

C- Workbook

D- Cell

E- Sheet

Explanation:

Got a 100% on this, the person above is incorrect.

I believe d is the answer !

ccording to the trust services framework, the reliability principle of integrity is achieved when the system produces data that

Answers

Answer:

According to the Trust Services Framework, the reliability principle of integrity is achieved when the system produces data that is accurate, complete, and unaltered. In other words, integrity ensures that the data generated by the system is:

Accurate: The data is free from errors and reflects the true state of affairs. It has not been tampered with or altered in any unauthorized way.

Complete: The data includes all relevant information and is not missing critical components or details. It provides a comprehensive view of the situation.

Unaltered: The data has not been modified, deleted, or manipulated inappropriately. It remains in its original, intended state and is protected against unauthorized changes.

Integrity is a fundamental principle in information security and data management, ensuring that data can be trusted for making decisions and conducting business operations. It helps prevent data breaches, fraud, and other forms of data manipulation.

Explanation: