1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena-2011 [213]
4 years ago
8

All of the following are methods of communication

Computers and Technology
2 answers:
ladessa [460]4 years ago
8 0

Answer:

Extermal hard drive

Explanation:

you can only get coding out of that

NNADVOKAT [17]4 years ago
3 0

Answer:

Extremal hard drive is not form of communication.

You might be interested in
______ includes websites that encourage interaction and connection among people, businesses, and organizations.
Sav [38]
Social Media is right I think. 
4 0
3 years ago
Read 2 more answers
Which of these is installed only on Apple smartphones and tablets?
melomori [17]
IOS. It's Apple's own custom OS system, built for their tech.
5 0
3 years ago
Read 2 more answers
The following is a true example of a computer: A. Toyota Camry
fomenos

Answer:

D

Explanation:

They all fit the definition of a computer

7 0
3 years ago
You use_____ to view an XPS file
Katyanochek1 [597]
Firefox
any web browser can open a xps file
4 0
4 years ago
Describe what a layer 3 router is and what are its advantages and drawbacks compared to other network devices.
Oduvanchick [21]

Answer:

Did you mean layer 3 switch? Because a router always operates at layer 3

Explanation:

If the answer is yes, then a layer 3 is a switch that combines the functions of a switch and a router. So it is capable of operate layer 2 and layer 3. Some of its benefits are: Support routing between VLAN, decrease network latency because the packets don’t have to make extra hops to go through a router and reduce security management. But they are really expensive and lack of WAN functionality so they are used mostly for large intranet environments.

3 0
4 years ago
Other questions:
  • If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’
    10·1 answer
  • which virtue you need to secure information by limiting computer access to authorized personnel only?
    10·1 answer
  • How can I collect tweets from different accounts concurrently and categorize the tweets in a corpus?
    15·1 answer
  • What is a main cause of an aurora?
    8·1 answer
  • What system calls have to be executed by a command interpreter? Why is it usually separate from the kernel?
    12·1 answer
  • Is the following statement TRUE or FALSE?
    9·1 answer
  • Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
    12·1 answer
  • Which is a concept of the CIA of Computer Security
    7·1 answer
  • In which situation is coauthoring of presentations primarily utilized?
    13·2 answers
  • The following code appears in a sort function. Will this function sort in increasing order (smallest first) or decreasing order
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!