a user complains that user files cannot be synced with the network file server while the user is traveling out of the office. the user had access to the internet but no access to the company network server. how can this be addressed? setup a sync partnership between the network server, microsoft onedrive, and the user. ensure that the user only uses a single device and not multiple devices when accessing networked files. turn off the activation of offline files feature in the sync center. setup a sync partnership with the networked file location.

Answers

Answer 1

Where a user complains that user files cannot be synced with the network file server while the user is traveling out of the office. the user had access to the internet but no access to the company network server. This can this be addressed by "Seting up  a Sync partnership between the network server, Microsoft OneDrive, and the user.

What is a Sync partnership?

(A sync partnership is a connection between an offline file and its online equivalent.) Windows shows the Offline Files dialog box when you click the Manage Offline Files link on the left side of the Sync Center.

Sync Center is a Windows feature that helps you to maintain information synchronized between your PC and network-stored files. The offline files option allows you to view copies of your network files even if you are unable to connect to the network.

Learn more about Sync partnership :
https://brainly.com/question/31722295
#SPJ1


Related Questions

Computer engineering is a career that......

Answers

Answer:

Computer engineering is a career that works on the development and research of new technology-related things.

Explanation:

13. This expression (a+b) 3 can be written in BASIC as follows:

A (a+b)^3 B. (a+b)*(a+b)*(a+b) C. Both as in A and B D. (a+b)x(a+b)x(a+b)

14. "Name$" is known as a

A. String B. Constant C. Variable D. Input driver

Answers

13. C. Both as in A and B. The expression (a+b)^3 can be written in BASIC either by using the exponent operator (^) or by multiplying (a+b) by itself three times. 14. A. String. "Name$" is a string variable in BASIC, denoted by the "$" symbol at the end of the variable name. It is used to store and manipulate text or character data.

In BASIC programming language, the expression (a+b)^3 can be written in two ways: either by using the exponent operator (^) or by multiplying (a+b) by itself three times. The exponent operator (^) raises the base (a+b) to the power of the exponent (3), resulting in (a+b)^3. Alternatively, multiplying (a+b) by itself three times results in (a+b) x (a+b) x (a+b), which can also be simplified to (a+b)^3. Both forms of the expression are valid and produce the same result.

"Name$" is a string variable in BASIC, which is used to store and manipulate text or character data. The "$" symbol at the end of the variable name denotes that it is a string variable. Here are the steps to declare and use a string variable in BASIC:

Declare the variable: To declare a string variable, use the "DIM" statement followed by the variable name and the "$" symbol. For example, "DIM Name$".

Assign a value: To assign a value to the string variable, use the "=" symbol followed by the value in double quotes. For example, "Name$ = "John" ".

Manipulate the string: You can manipulate the string variable using various string functions such as "LEFT$", "RIGHT$", "MID$", and "LEN$". For example, to extract the first three characters of the string, you can use "LEFT$(Name$, 3)".

Print the string: To display the value of the string variable, use the "PRINT" statement followed by the variable name. For example, "PRINT Name$". This will display the value of the variable "Name$" on the console.

Know more about the programming language click here:

https://brainly.com/question/29362725

#SPJ11

Suppose you have been hired as a Software Engineer by a company XYZ. You have been assigned a task to develop a complex data processing application, involving the parsing and analysis of large XML files that contain structured data. This structured data is organized and formatted consistently. Your specific responsibility revolves around memory allocation for the data processing tasks, with a focus on fast data access and no requirement for memory deallocation. For doing so, either you will carry out the stack memory allocation or heap memory allocation.

Answers

As a software engineer, my responsibility revolves around memory allocation for the data processing tasks with a focus on fast data access and no requirement for memory deallocation.

For this task, either stack memory allocation or heap memory allocation can be used. Before deciding between stack and heap memory allocation, we should understand the basics of both types of memory allocation. Stack Memory Allocation: Stack memory allocation is an automatic memory allocation that occurs in the stack section.

It is a simple and efficient way of memory allocation. However, it is limited in size and can result in stack overflow if the allocated size is more than the limit. It follows a Last In First Out (LIFO) order. It is faster compared to heap memory allocation due to its simple mechanism and fixed size.

To know more about engineer visit:

https://brainly.com/question/31140236

#SPJ11

import pickle
def enter():
f1=open("c:\\xics\\data.dat","wb")
n=int(input("Enter ni of students."))
for i in range(n):
rno=int(input("Enter roll no."))
name=input("Enter name")
marks=int(input("enter marks"))
d={"rno":rno,"name":name,"marks":marks}
pickle.dump(d,f1)
f1.close()

Answers

Answer:

Export ariana grande fort nite skin

Answer:

I M P O R T P I C K L E

Explanation:

it appears this account relationship is not online banking enabled

Answers

Check your options to make sure you didn't hide the account. Restart your browser after clearing your cookies and memory cache. After that, try logging back into your online bank. Ensure that the web browser you're using is compatible.

What does the relational bank account look like?

The Relationship Bank Account (RBA) is remarkably similar to a bank checking account. You can put money into the relationship and strengthen it, or you can take withdrawals and make it weaker. Consistent investments made over a long period of time always result in a robust and healthy partnership.

What does a relationship account serve as?

Relationship Banking: What Is It? Relationship banking is a tactic adopted by banks to increase client loyalty and offer a centralized point of contact for a variety of products.

To know more about cache visit:-

https://brainly.com/question/28232012

#SPJ1

When constructing the Ethernet datagram to send the packet from Router Y to Router Z, what information needs to be in the destination MAC address? Router Z's MAC address Computer 2's MAC address Computer I's MAC address Router Y's MAC address

Answers

When constructing the Ethernet datagram to send the packet from Router Y to Router Z, the destination MAC address should be Router Z's MAC address.

The destination MAC address in an Ethernet datagram specifies the intended recipient of the packet. In this case, as the packet is being sent from Router Y to Router Z, the destination MAC address should be set to Router Z's MAC address. This ensures that the packet is correctly routed to the intended destination.

The source MAC address, on the other hand, should be set to Router Y's MAC address, indicating the sender of the packet.

It's important to note that the MAC addresses of computers or other devices connected to the network, such as Computer 2 or Computer I, are not relevant in determining the destination MAC address when sending a packet between routers.

Learn more about MAC address here:

https://brainly.com/question/25937580

#SPJ11

The _____ database structure is more flexible and stores data as well as instructions to manipulate the data.

Answers

Answer:

Databace

Explanation:

Which of the following are true about App-V? (Choose all that apply.)
a. Apps are updated when the source on the server is updated.
b. Virtual environments allow a 16-bit app to be run on a 64-bit operating system.
c. Virtual environments prevent conflicts between apps.
d. Apps are streamed for installation.
e. RDP is used to access the app.

Answers

App-V is a popular application virtualization technology developed by Microsoft. It provides a convenient way to deploy and manage applications across different devices, without requiring traditional installation methods. In response to the question, the true statements about App-V are as follows:

a. True - Apps are updated when the source on the server is updated. With App-V, applications are delivered and managed from a central location, typically a server. When updates are made to an application, they are automatically propagated to all devices that have the application installed. This ensures that all users are using the most up-to-date version of the application. b. False - Virtual environments allow a 16-bit app to be run on a 64-bit operating system. While App-V provides a virtualized environment for applications, it does not have the ability to run 16-bit applications on 64-bit operating systems. c. True - Virtual environments prevent conflicts between apps. App-V isolates each application in its own virtual environment, which ensures that there are no conflicts with other applications or the underlying operating system. This also makes it easier to manage and troubleshoot applications. d. True - Apps are streamed for installation. With App-V, applications are not installed in the traditional sense. Instead, they are streamed to the device when needed. This means that applications can be delivered quickly and efficiently, without requiring large downloads or lengthy installation processes. e. False - RDP is used to access the app. While remote desktop protocol (RDP) is a common way to access applications, it is not required with App-V. Instead, applications can be accessed through a variety of methods, including a web browser, a shortcut on the desktop, or a start menu entry.

Learn more about App-V here

https://brainly.com/question/31810963

#SPJ11

question 3 sql is a language used to communicate with databases. like most languages, sql has dialects. what are the advantages of learning and using standard sql? select all that apply.

Answers

SQL is the relational database language that meets ISO/ANSI standards. SQL is a language for both defining and manipulating data. It can also express updates and be used as a query language.

What SQL language used to communicate with databases?

SQL's goal is to manage, retrieve, store, and manipulate data in a database management system. It is frequently pronounced sequel. Early in the 1970s, IBM began to create SQL.

Therefore, it was first made available for purchase in 1979. It is acknowledged as the normative relational database management system on a global scale (RDBMS).

Learn more about SQL here:

https://brainly.com/question/13155693

#SPJ1

Write a program that:

Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint: use Mod).
Displays the sum.
Situation B
Write a procedure that takes a positive integer as a parameter. If the number given to the procedure is no more than 30, the procedure should return the absolute difference between that number and 30. If the number is greater than 30, the procedure should return the number doubled.

Answers

Situation A:

#include <iostream>

#include <vector>

#include <string>

int main(int argc, char* argv[]) {

 //Fill it by own.

 std::vector<int> lotsOfNumbers = {0,1,2,3,4,5,6,7,8,9};

 //Loop to find odd numbers.

 for(int i=0;i<lotsOfNumbers.size(); i++) {

   if(lotsOfNumbers[i]%2!=0) std::cout << lotsOfNumbers[i] << std::endl;

   else continue;

 }

 return 0;

}

Situation B:

#include <iostream>

#define check(x) ((x>30) ? 2*x : 30-x)

int main(int argc, char* argv[]) {

 std::cout << check(15) << std::endl;

 std::cout << check(-2) << std::endl;

 std::cout << check(30) << std::endl;

 std::cout << check(78) << std::endl;

 

 return 0;

}

Write a program that:Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers
Write a program that:Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers

Why is it important to register your software when you install it

Answers

the normal reasons program creators deliver to enroll your program – to get tech bolster, news, upgrades, offers, bug fixes, and so on. It too ensures your venture since it gives you changeless get to to your enlisted serial number in case something ever happens to your computer or computer program.

Why is it important to keep in mind the rendering process in video games?

Answers

Answer:

Rendering absolutely hammers the processor so the CPU is arguably the most important component when choosing rendering hardware. Each CPU features multiple processors (called cores). The more cores you have, the faster the render. As a rule of thumb, doubling the number of cores halves the rendering time. With that being said you need to make sure your rendering isn't to slow or you will loose coustumors for your company.

Explanation:

Hope This Helps

Have A Great Day

~Zero~

What is the term for a male reproductive cell?​

Answers

Answer:

I believe it is a sperm cell.

Explanation:

Not a sex cell because that can apply to both female and male reproduction.

which of these describe raw data?check all of the boxes that apply A) what a person buys B) where a person lives C) data that has been analyzed D) data that has not been analyzed

Answers

D) data that has not been analyzed

Please help for MAXIMUM POINTS!
Jarod’s boss sends him an e-mail about a task that she wants him to complete. In the email she asks that he collect the clothing size information of all 900 employees in his company and then place a branded clothing order with their supplier. After sending the email, his boss schedules a meeting with Jarod for the next day so that he can ask her any questions that he may have. What are four things that Jarod can do to ensure that he collects all the information he needs to do the task well?

Answers

First he should figure out which people where the same brands and sizes then he must figure out how many of them are female and male then next he must figure out the exact numbers of how many people wear all the diffrent brands and collect their names

Marina requested a copy of her credit report in May 2019 and wants to request a second one in November 2019. What is true?

O She can; it is always free
She can, but she may have to pay for it
O She will not obtain it, a free copy can be requested every two years.
O She will not obtain it, the bureau sends it automatically once a year

Answers

Answer:

B. She can, but she may have to pay for it.

Explanation:

A credit report is a report that contains the credit history of an individual. A credit report is issued by Credit bureaus who have financial information of a person.

Credit bureaus issue one credit report for free every year. But if a person desires to issue a credit report more than once a year then he/she will have to pay a fee for it.

In the given scenario, Marina who has requested a copy of the credit report in May 2019, will have to pay a fee for a copy of the second credit report.

Therefore, option B is correct.

Software developers_____their programs, while buyers only own the right to____use the software.

Answers

The majority of software works are copyright protected, which means that in order to use the software in any way, you must first obtain a license from the developer or other copyright holder.

How is using a piece of software sanctioned legally?The majority of software works are copyright protected, which means that in order to use the software in any way, you must first obtain a license from the developer or other copyright holder. Public domain products, on the other hand, are not protected by copyright; anybody is free to alter and utilize such software.The software application may be made available to users for a one-time price in exchange for ownership rights. It is generally accepted that this strategy—purchasing the license up front and acquiring the right to use the software perpetually—is the conventional method of owning software. Perpetual licenses are a particular kind of buying agreement.              

To learn more about software refer to:

https://brainly.com/question/28224061

#SPJ1

100 points
Read this article discussing the amount of time that people of various ages and education levels report spending on different technologies. Ask at least 12 of your adult friends and family members the same survey question. (The more people you ask, the better.)

How do your survey results compare with the results in the article? What are some possible reasons your results might be different? When comparing the results, be sure to take into account the margin of error for the survey discussed in the article.

Answers

My survey results overall varied quite a bit from the results in the article. Many of my survey respondents reported higher estimates than what was found in the article, especially in regards to the time spent on television. This may have been due to a response bias, as participants may have been overestimating the amount of leisure time activities they undertake. Additionally, the demographics of my survey respondents may have been different from that of the article - for example, my survey respondents were primarily from the United States

How big of a role does social media play in the mental health of people? Does it do more harm or good? Explain why. in 400 words

Answers

The role that social media play in the mental health of people is big. The use of social media is one that is known to have c positive effects for example connecting people, giving a platform for self-expression, and others.

What is the  role that social media?

The  key bad  impacts of social media on mental health is one that is known to have the potential for addiction. Social media platforms are said to be set up to be a form of engaging, which can result to individuals spending excessive amounts of time going through their feeds and this may lead to depression.

Hence the negative impact of social media on mental health is the one that can also lead to cyberbullying that is Online harassment.

Learn more about  role that social media from

https://brainly.com/question/1163631

#SPJ1

Create a secure password (10 points)
Ask the user how long they want their password to be, then return a randomized password that includes all the letters of the alphabets, capitalization, numbers, and special characters.

Answers

Answer:

python

Explanation:

import random

secret_length = input("how long you want the secret to be?\n")

secret_length = int(secret_length)

characters = r"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789$%^&*("
secret = ""

for i in range(secret_length):

   secret = secret + random.choice(characters)

print(secret)

Match each task with the features necessary to complete the task

Match each task with the features necessary to complete the task

Answers

Answer:

the first one on the left row to the 3rd one in the right row

the second one on the left row to the top one in the right row

the third one on the left row to the middle one in the right row

Explanation:

looks like you got it right though already

Situation: You have been asked to compare and contrast the concepts of http:// and file:///. Write a few sentences comparing these concepts.

Answers

Answer:

the file isnt coming up

Explanation:

1. Write a program that finds all students who score the highest and lowest average marks of the first two

homework in CS (I). Your program should read the data from a file called "hw2. Txt" and displays the output to

another file called "hw2. Txt" and on the screen. Each data line contains student name and his/her marks. The

output should display all student names, marks, numerical grades and letter grades. In addition, you should

output the highest and lowest marks and those who earned. Sample input

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that finds all students who score the highest and lowest average marks of the first two homework in CS.

Writting the code;

import java.io.BufferedWriter; //for bufferedWriter

import java.io.*; //for basic input/output

import java.io.IOException; //for IOException

//parent class

public class dataReadWrite {

//main function

public static void main (String[] args) throws IOException

{

//declare & initialize required variables

int count=0;

float m1=0,m2=0,avgM=0,maxAvg=0,minAvg=101,cAvg=0;

String fName="",lName="",grade="",cGrade="",topper="",bottomer="";

//create a file object using its location(file to be read)

File file = new File("");

//attach a readeer to file

BufferedReader reader = new BufferedReader(new FileReader(file));

//create a file to be writtem

BufferedWriter writer = new BufferedWriter(new FileWriter(""));

//write file header

writer.write("Student Name Mark1 Mark2 Avg. Mark Grade\n");

writer.write("-----------------------------------------------------------------------------------------------------\n");

//read file line by line

count = Integer.parseInt(reader.readLine());

//read data

String str;

//iterate till last line of the file

while((str = reader.readLine()) != null)

{

//split read data by one or more space

String[] eachLine = str.split("\\s+");

//store data's first member as firstName

fName = eachLine[0];

//store data's second member as lastName

lName = eachLine[1];

//store data's third member as marks 1

m1 = Float.parseFloat(eachLine[2]);

//store data's fourth member as marks 1

m2 = Float.parseFloat(eachLine[3]);

//find average for each student

avgM = (m1+m2)/2;

//store data for topper

if(avgM > maxAvg)

{

maxAvg=avgM;

topper = fName + " " + lName;

}

//store data for bottomer

if(avgM < minAvg)

{

minAvg=avgM;

bottomer = fName + " " + lName;

}

//cumulate marks for class average

cAvg += avgM;

// calculate grade for each student

if(avgM>=90)

grade="A";

else if(avgM>=80)

grade="B";

else if(avgM>=70)

grade="C";

else if(avgM>=60)

grade="D";

else if(avgM>=50)

grade="E";

else

grade="F";

//write student data to file

writer.write(fName+" "+lName+" "+m1+" "+m2+" "+avgM+" "+grade+"\n");

}

//calculate class average by dividing by the count

if(count!=0)

cAvg/=count;

//find class grade

if(cAvg>=90)

cGrade="A";

else if(cAvg>=80)

cGrade="B";

else if(cAvg>=70)

cGrade="C";

else if(cAvg>=60)

cGrade="D";

else if(cAvg>=50)

cGrade="E";

else

cGrade="F";

//print data to output file

writer.write("The Maximum average mark is: "+maxAvg+" Scored by: " +topper+"\n");

writer.write("The Minimum average mark is: "+minAvg+" Scored by: " +bottomer+"\n");

writer.write("The average of the class: "+cAvg+"\n");

writer.write("The Grade of the class: "+cGrade+"\n");

//close the file

reader.close();

writer.close();

}

}

See more about JAVA at brainly.com/question/12974523

#SPJ1

1. Write a program that finds all students who score the highest and lowest average marks of the first

What is the major responsibility of transport layer?

Answers

The major responsibility of the transport layer is to ensure reliable and efficient communication between hosts on a network. It accomplishes this through the use of protocols such as TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).

TCP provides reliable, connection-oriented communication. Its main responsibility is to establish a reliable and error-free data transfer by ensuring that all packets are delivered, in order, and without any loss or duplication. TCP achieves this through features like flow control, congestion control, and error detection and recovery.

UDP, on the other hand, is a connectionless and unreliable protocol. Its primary responsibility is to provide a simple and lightweight mechanism for sending datagrams without the need for establishing a connection. UDP is commonly used for applications that prioritize speed over reliability, such as streaming media or online gaming.

In summary, the transport layer's major responsibility is to ensure reliable and efficient communication by selecting the appropriate protocol (TCP or UDP) based on the application's requirements. It ensures data integrity, sequence, and flow control, thereby enabling effective data transfer.

To know more about protocols visit :-
https://brainly.com/question/30547558
#SPJ11

you are currently working at the administrator command prompt on the dc10 server. you need to run a series of commands to complete several management tasks on the dc13 server. dc10 and dc13 are in the same domain, but dc13 is in another building on the other side of your company campus. you want the command prompt on dc10 to behave as if it is the command prompt on dc13. use the drop-down list to fill in the blank with the switch you must use to complete the following command.

Answers

To configure the command prompt on DC10 to behave as if it is the command prompt on DC13, you would enter the following command (Cmd): winrs -r: DC13

When Multiple servers must be managed from a single Server Manager interface. To add more servers to the server management pool, you must open the Add Servers dialogue. You can select the "Manage" or "All Server" menu options.

On DC10, you are utilizing an admin-level command prompt. The DC13 server does not require management, but you must be aware of its IPConfig. The domain in which DC10 and DC13 are located. Then this command winrs -r: DC13 ipconfig would you enter to view the IP configuration of DC13.

You are the domain administrator for a number of servers. DC10 and DC13, two of the servers, are located in various structures. You want to run DC13 from DC10, where you are. On DC13, you'll use Remote MMC snap-ins to enable remote management. Because DC13 belongs to your domain, you are aware that Windows Remote Management is already enabled on that machine. The firewall exceptions (there are two) in DC13's firewall need to be activated.

Learn more about Command Prompt

https://brainly.com/question/25808182

#SPJ4

1. each row of the table represents an instance of an object. what is the best name for that object?

Answers

Each row of the table represents an instance of an object. The best name for that object would depend on the context and the specific nature of the table. However, a commonly used term for an object represented by a row in a table is a record.

In database terminology, a record typically refers to a collection of related data fields or attributes that describe a specific entity or object. Each row in a table represents a unique instance or record of that object, containing values for each attribute or field associated with it.

For example, in a table representing employees, each row would represent a different employee record with attributes such as name, age, job title, and salary. The row or instance of the employee in the table would be referred to as an employee record.

It's important to consider the specific domain and context of the table to determine the most appropriate name for the object represented by each row.

Learn more about row of the table here:

https://brainly.com/question/31839226

#SPJ11

Your grandfather got a call from Microsoft telling him that, according to their records, his computer is running very slow lately. They guide him to a website where he downloads a program that lets the person on the phone interact directly with his computer to fix the problem. What has your grandfather fallen victim to

Answers

Scam he just got scammed and is now dealing with hackers

kiora is setting up an rodc for the first time at one of her organization's branch offices. she creates a prestaged rodc computer account. next, she installs a windows server 2019 system that will function as the rodc. what is the most appropriate step that kiora should take next?

Answers

Once the RODC computer account has been established and Windows Server 2019 has been installed, Kiora should move forward by elevating the server to the role of Read-Only Domain Controller.

Why is this useful?

By utilizing Server Manager, she can incorporate the role of "Active Directory Domain Services" and proceed with the configuration wizard in order to elevate the server to an RODC status.

Another option is to utilize PowerShell commands to accomplish this objective. By undertaking this procedure, the Windows Server 2019 setup will function as a RODC, facilitating domain services and reducing data security issues in the branch office.

Read more about windows server here:

https://brainly.com/question/30378924

#SPJ1

What is a method for confirming users’ identities?

Answers

Answer: Authentication

Explanation:

Have you ever uploaded a photo you took to a social media site? If so, there is a good chance that because you agreed to the social media company’s terms of service, the company can use your photo for promotional reasons. Do you think it is OK that social media companies make users agree to let them use users’ photos? Why or why not?

Compare what you think about social media companies using users’ photos to people claiming photos they found online as their own.

Answers

The issue here is social media privacy.

Social media companies and many others who have mobile applications offer their services for free. Legally speaking, it is left to the prospective or existing user to read through the fine print they make users agree to. It also behooves the users to decline from using the services if they so wish. Although there are laws that guide the use of personal information, some of these rights may have been unknowingly waived by agreeing to the terms and conditions of social media sites.

What are the laws guiding companies in the use of personal information?

The Data Protection Act 2018 ("the Act") governs "personal data," which is information about persons. It enables citizens the right to access their own private data through subject access requests and contains regulations that must be observed while processing personal data.

For example, the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the Children's Online Privacy Protection Act of 1998 (COPPA), and the Fair and Accurate Credit Transactions Act of 2003 (FACTA) are all examples of federal laws in the United States with provisions that encourage information flow.

Learn more about social media privacy:
https://brainly.com/question/1297932
#SPJ1

Other Questions
A muscle strain is a sustained contraction of the muscle. 234.156Manuel and Fernando are talking on the phone. Complete theirconversation with the correct form of the appropriate verb.dardecirsalirtraerponervenirManuel: Cundo_1. t a mi casa? tenemos quedecorar los carritos para las Fiestas de Quito.Fernando: Yo _2. de aqu en quince minutos y llego en media hora.Manuel: Elena 3. que la carrera (race) empieza a las dos.Fernando: Hay un desfile (parade) despus. Vas a traer tu guitarra?Manuel: S, yo la_4. . Quiero tocar una serenata quitea.Fernando: Y yo voy a cantar! Qu hacemos despus del desfile?Manuel: Elena y yo 5. una fiesta en casa. Ahora ella preparala ensalada y yo 6. la mesa.Fernando: Bueno, llego en media hora. Hasta luego! what are the missing blanks? ANs and WANs can be set up in several different shapes, also known as peripherals.A. TrueB. False Multiply (-6 + i)(-2 + 9i).a 45 - 130ib 95 - 52ic 3 - 56id 120 - 21ie None of the aboveanyone wanna be friends cause im boreeed Why were cenotes important to the Maya?They were valuable trade items.They were fertile areas for farming.They were used to perform sacrifices.They were the main source of drinking water. Which of the following shows a function written in equation notation that is equivalent to the function below? f(x) = 3(x+10) Pioneers and American Indians became competitors for _____, a vital and often scarce resource in the Wes Anu bought 15 stickers for 225 each and Arjun bought 25 stickers for 215 each. Who paid more? Give a reason for your answer. two real numbers are selected independently at random from the interval [20,10]. what is the probability that the product of those numbers is greater than zero? A jewelry maker has 51 inches of chain. She wants to cut the chain into 9 equal parts. How long will each part be? Please Help I Don't Understand A person in a lighthouse sights a boat in the water. Which is closest to x, the distance between the base of the lighthouse and the boat? A(n) ____ is often used so remote users have a secure connection to the organizations network. a. virtual private network b. terminal resource network c. biometric security system d. intrusion detection system Which of these is an air current?A.El NinoB.La Nina C. Gulf StreamD.Jet Streambrainliest for whoever gets it right!!! Which nervous system cells respond to injury? What is the final and most important product of cellular respiration? Need today right nowvery easy Please I need this ASAP What are the major activates of operating systems with regard to file management?