1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
2 years ago
10

What is bigger that terbites

Computers and Technology
2 answers:
7nadin3 [17]2 years ago
4 0

Answer:

Units larger than a terabyte include a petabyte, exabyte, zettabyte, yottabyte and brontobyte. A geopbyte is also larger than a terabyte and refers to 10 30 bytes, or 1,000 brontobytes. Additional units of measurement become necessary as the amount of data in the world increases.

Explanation:

TiliK225 [7]2 years ago
4 0

Answer:

I think you mean terabyte so the answer would be a petabyte

Explanation:

There are more thing that are bigger than terabytes and petabytes too, here are a few of them. exabyte, zettabyte, and yottabyte

You might be interested in
A form of brainstorming that serves as a visual aid to thinking laterally, helps explore a problem (usually by stating the probl
ELEN [110]

Answer:

The answer is BRAINSTORMING

Explanation:

<em>A visual aid to thinking laterally and exploring a problem, usually by stating the problem in the center  of the page and radiating outward spokes for components of the problem. Each component can then be considered separately with its own spokes, so that each point , thought, or comment is recorded.</em>

7 0
3 years ago
What will happen when users attempt to connect via Telnet or SSH for enable mode when neither the enable secret password command
vovikov84 [41]

<u>Attempt to connect via Telnet or SSH for enable mode:</u>

  • Normally telnet and SSH ism to used login to network socket. Basically to login user is prompted with password and verified.
  • Secret password is one more level to login to access the network.
  • It is used to login copy files to web server so that website pages are update. End user can copy or move the files from web server or cloud computer or UNIX servers.
  • Enable secret password if it is configured, end user login with encrypted technology and plain text format is displayed.
  • Different between enable secret and enable password is enable secret is encrypted and enable password is not encryption and plain text.
6 0
3 years ago
When connecting to the internet, most internet users connect to a tier 1 network.​?
denis23 [38]
False

Tier 1 ISPs exchanges traffic with other tier 1 internet traffic providers and are the backbone of the internet. They do not provide traffic to end users but provide internet to other ISPs. Tier 3 is the last mile provider who delivers internet access to homes and businesses.



8 0
3 years ago
What is the most common data link layer protocol for a wired connection
krek1111 [17]
I think the answer is The PPP (Point-to-Point Protocol). <em />

It is the most common type of protocol that people use using a modem, a device or a router to have an internet connection. Here there two systems that establish a link to each other which is the point to point. The bits are transferred to a sender and a receiver. 

4 0
2 years ago
Read 2 more answers
Select the true statement from those listed below. Java applets may be contained in files with the .class extension Java applets
tiny-mole [99]

Answer:

The correct option of the following question is the Java applets may be contained in the files with .class extension.

Explanation:

JAVA is the Programming Language that can used to create the complete applications which may be run on the single computer or can be distributed among the servers and the clients in the network.

An applet is Internet-based programs that are written in the Java programming language, which is the programming language for Web and it can be downloaded by any of the computers. An applet is also run in the HTML. It is usually embedded in the HTML page on the Website and it can be executed from the browser.

5 0
2 years ago
Other questions:
  • which of the following is a malicious program that can replicate and spread from computer to computer? A. Email B. Virus C. Spam
    15·1 answer
  • HELP ASAP
    10·2 answers
  • Select the answer that best describes the activity
    5·2 answers
  • Which is worse: Fast charging (Due to heat) or unplugging before reaching full capacity (On a normal charge)?
    9·1 answer
  • A golf ball is at rest on the grass. What must happen to cause the ball to move?
    5·1 answer
  • Part1) Given 3 integers, output their average and their product, using integer arithmetic.
    12·1 answer
  • Explain why the process of sketching in engineering might resemble a loop or a cycle.
    15·2 answers
  • Which of the following boxes should replace question mark
    8·1 answer
  • A ____ is an Access feature that makes it easy to enter data.
    7·2 answers
  • a web server will utilize a directory protocol to enable users to authenticate with domain credentials. a certificate will be is
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!