1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
2 years ago
14

Explain download as used in computing environment.

Computers and Technology
1 answer:
oksano4ka [1.4K]2 years ago
6 0

Explanation:

Downloading is the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device. Download can refer to the general transfer of data or to transferring a specific file. It can also be called to download, DL or D/L.

please mark be brainliest

You might be interested in
Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793?
Shkiper50 [21]

Answer:NULL Scan

Explanation:RFC 793(Request for comments) is a type of RFC command labeled with the number 793 which can operate with the TCP protocol.They are sort of document form which is from IETF( Internet Engineering Task Force ).

The null scan is scanning protocol used by legal as well as illegal hackers for working in the transfer control protocol architecture. It is used for the identification of the the ports and holes in TCP servers.they can also have the negative impact if used by the illegal hackers.

5 0
3 years ago
What can multivariable calculus show for a data set.
dalvyx [7]

Answer:

They can help to explain the relationship between the output and input variables.

Hope this Helps!

5 0
2 years ago
What are the components that make a computer work?
Schach [20]

Answer: Plastic, metal, rubber, wiring, electricity, technology, wifi,  

Explanation: You need  PLASTIC to make a frame for the computer. METAL

to make an exoskeleton under the plastic frame. RUBBER to hold those loose wires and to make sure the electricity doesn't escape and shock you. ELECTRICITY to charge and make the computer runs.  Technology is used for you to log in and out of your computer and WIFI to make sure it doesn't lag.

8 0
3 years ago
Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c
TiliK225 [7]

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
4 0
3 years ago
Suppose a book author can be identified by an AuthorID and each book can be identified by an ISBN. Besides the identifier, an au
Scrat [10]

Answer:

a) We know that atleast one or more author writes a book.

Symbol to indicate one or more is (B)

So the correct option is B

b) We know that zero to multiple books are written by any author.

Symbol to indicate zero or more is (A)

So the correct option is A

c) The fourth option is correct if we replace by many to many relationship and generate a new entity.

So the relationship betweem author and contract is one to many. So we know that there is atleast one author that represent in symbol d and books has atleast 0 that represent in symbol c.

So Fourth Option is correct d at blue side and c at red side.

d) There are two forirgn keys in table Contract one is from AuthorId and other is ISBN.

So correcct option is C

6 0
3 years ago
Other questions:
  • Which is a common problem caused by the widespread use of computers?
    7·1 answer
  • Suppose you want your firewall to block all incoming Telnet connections but to allow outbound Telnet connections. One approach w
    9·1 answer
  • Advatages and disadvantages of power-concentrated train​
    6·1 answer
  • Why is democracy the best form of government
    5·1 answer
  • Select the correct answer.
    11·1 answer
  • When was internet started in which year​
    13·2 answers
  • The _____ feature will mark all changes made to a document for others to review at a later time.
    13·1 answer
  • Classify the various scenarios in a web development team that is creating a website for a client according to the priority level
    9·1 answer
  • Which is the first computer brought in nepal for the census of 2028 B.S​
    6·1 answer
  • For computer forensics, ____________ is the task of collecting digital evidence from electronic media.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!