1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
2 years ago
6

Communication between a computer and a keyboard involves ______________ transmission.

Computers and Technology
1 answer:
4vir4ik [10]2 years ago
8 0

Answer:

Simplex transmission

Explanation:

Communication between computer and keyboard involves which transmission? Answer: Simplex transmission requires communicating between a computer and a keyboard. The simple transmission & communication channel allows data from only one direction.

You might be interested in
Individuals who break into computer systems with the intention of doing damage are called​ _____________.
notka56 [123]
I think the answer is hackers
7 0
3 years ago
Groupthink refers toA) the willingness of individual group members to withhold contrary or unpopular opinions, even when those o
Ivan

Answer:

The correct answer is A.

Explanation:

Groupthink is a theory that is applied to decision making psychology in groups, developed by Irving Janis. The theory roots itself to the problem of conformity especially in group settings. When a decision is made in a group, some members, even though they believe that the decision made is wrong or can be better, get caught up in the conformity problem and follow the accepted solution to allign with the group's decision.

I hope this answer helps.

5 0
3 years ago
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone
erastovalidia [21]

2010s is the one who created the iPhone

8 0
3 years ago
What are some of the risk associated with professional emails
noname [10]

Answer:

the answer is its a lot of riskes you would have to worry about tour email getting haacked into and lossing all of your personal information

Explanation:

5 0
3 years ago
Other questions:
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • Melissa is the network administrator for a small publishing company. as network administrator, she is in charge of maintaining t
    8·1 answer
  • Charts are inserted into an excel spreadsheet using the commands in the charts group on the ____ tab on the ribbon.
    13·1 answer
  • Why is investing in a mutual fund less risky than investing in a particular company's stock? A. Mutual funds only invest in blue
    14·2 answers
  • katniss dismisses effie's metaphor because, literally, she knows pearls cannot be created with pressurised coal,they come from w
    5·2 answers
  • Which of the following best describes a situation where software should be upgraded instead of replaced?
    6·1 answer
  • Make a presentation on ms word
    6·2 answers
  • ## Inputs
    15·1 answer
  • I WILL MARK BRAINLEST
    7·1 answer
  • Task 2
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!