1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
2 years ago
11

Which type of network allows backups and network security to be centrally located?

Computers and Technology
1 answer:
BlackZzzverrR [31]2 years ago
3 0

Answer:

B

Explanation:

B is the answer.

You might be interested in
QUESTION 56 Use the Windows ________ to check on a nonresponsive program. Backup utility Error-checking System Restore Task Mana
ASHA 777 [7]

Answer: Task manager

Explanation: The task manager window represents an interface in personal computers manufactures by Microsoft. The task manager window contains several information about a computers current processes usually displayed in graphical manner, in addition it provides information on the current running processes and application, the uptime of the computer, the graphic processor. With the task manager window users can set process priorities and prioritize applications, by affording users to view process and their corresponding load on the CPU, users can terminate or close applications from within the task manager interface. Hence non-responsuve programs can be viewed and terminated.

5 0
3 years ago
Local variables:A. Lose the values stored in them between calls to the method in which the variable is declared
Serjik [45]

Answer:

All of the above

Explanation:

A local variable is a variable which is declared within a method or is an argument passed to a method, it scope is usually local (i.e. it is hidden from other method). it can also have the same name as a local variable in another method and it loses the values stored in them between calls to the method in which the variable is declared. So all the option listed above are correct.  

3 0
3 years ago
• Describe the steps in detail that the operating system performs to handle interrupts, including ISRs, the stack, and hardware?
sdas [7]

Answer:

Operating system is the software that is used to control different hardware of computers and handle scheduled tasks.

It also handles the interrupts from some external devices, or from some software. The interrupts are handled through Interrupt service routine. When some external event occurs the following steps has been taken by OS to perform the operation

  1. In first step, an external event has been occurred, and request to the cpu to perform operation.
  2. This request invoke ISR (Interrupt service routine), to perform the operation.
  3. The interrupts are stored in stack on the priority basis.
  4. The CPU performs the operation on Interrupt as per request of ISR.
  5. After Completing operation, CPU return to its initial task.  

5 0
4 years ago
Which opera component is a solo performance
Arturiano [62]
 A solo piece written for a main character, which focuses on the character's emotion
4 0
3 years ago
Read 2 more answers
ICS encourages jurisdictions to use common terminology. Common terminology:
ololo11 [35]
The answer is (a) Uses plain English to allow personnel from different agencies to work together.
ICS or Incident Command System is a systematic tool used for the control, command, and coordination of emergency response. To work together, the ICS allows the use of common terminology and operating procedures.  
3 0
3 years ago
Other questions:
  • A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some
    11·1 answer
  • What does Mishler mean by the foreground-background interaction? How can this affect the photographs, based on the examples in t
    14·2 answers
  • Sql provides the ________ technique, which involves placing an inner query within the where or having clause of an outer query.
    8·1 answer
  • cd to the directory called final that is located within my home directory. While viewing the file called mypasswd you notice tha
    12·1 answer
  • Working with do-while loop
    9·1 answer
  • Google Slides is most similar to which of the following programs?
    10·2 answers
  • Identify the technique to free up the CPU by allowing device controllers to independently transfer data between the device and m
    7·1 answer
  • Identify the programmer’s responsibility in maximizing the programs reliability by having awareness of the beneficial and harmfu
    8·1 answer
  • 4. Cash inflows from investing activities normally arise from all of the following EXCEPT
    14·1 answer
  • Write a program that prompts the user for two numbers then outputs the result of dividing the first number by the second number
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!