1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
4 years ago
14

Type the correct answer in the box. Spell all words correctly.

Computers and Technology
1 answer:
OleMash [197]4 years ago
3 0

Answer:The page up and page down keys are sometimes called PgUp or PgDn and they are located on the right of the keyboard with page up on top and page down on the bottom. This short article about technology can be made longer.

Explanation:

You might be interested in
C++Assign to maxSum the max of (numA, numB) PLUS the max of (numY, numZ). Use just one statement. Hint: Call FindMax() twice in
neonofarm [45]

Answer:

Replace the comment with:

maxSum =FindMax(numA,numB)+FindMax(numY,numZ);

Explanation:

Required

The statement to add up the two maximum from the functions

To do this, we have to call FindMax for both arguments i.e.

FindMax(numA,numB) and FindMax(numY,numZ) respectively

Next, use the + sign to add up the returned value.

So, the complete statement is:

maxSum =FindMax(numA,numB)+FindMax(numY,numZ);

<em>See attachment for complete program</em>

6 0
3 years ago
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
Mamont248 [21]

Answer:

false negative

Explanation:

A false negative is a dangerous state in which the IDS (Intrusion Detection System) assumes the activity as acceptable in which the activity is actually an attack occurred on the system.

That means, the Intrusion Detection System has failed to catch the attack. This is the most dangerous state, as the systems were compromised and the network or cyber security people were unable to find the attack.

More generally, there are two types of Intrusion Detection Systems ( IDS ). Network based IDSs ( NIDS ) and Host based IDSs ( HIDS ).

5 0
4 years ago
Which best describes the purpose of LoJack on a computer
iris [78.8K]

Answer:The purpose of the lo jack on a computer  to the lock and delete files on the computer devices.

Explanation:The lo jack on a computer to locate all the lock and delete files.

lo jack can provides the computer on the passwords that contains different levels of the bios access.

lo jack perform on the computer operating system provides on the boot only the trusted by the computer operating system.

Lo jack computer on the function is used to the published  the exam answers on the websites.

Lo jack insures to the data into hard drives to the correct computer password.

3 0
3 years ago
50 points!!!!!
prohojiy [21]
I would say a. correcting others' spelling and grammar.
3 0
4 years ago
Read 2 more answers
Why OSI is called open system?
MAXImum [283]

Answer: OSI system is called Open System Interconnection because It provides the collection of protocols for the connection of different system to connect with  any dependence on any other system or network.

Explanation: Open system interconnection establishes a connection between the different system for the communication purpose using several protocols and software standards .It has no dependency or any network or other system to do the functioning and works using the seven layers of the OSI architecture.Thus, that is why OSI system known as open system.

7 0
4 years ago
Other questions:
  • What is the only true way to wipe out every possibility of the virus?
    11·1 answer
  • True/False
    11·1 answer
  • Match the web development languages to their type.
    13·1 answer
  • What type of computer is likely to use so-dimms, have an internal power supply, and use a desktop processor socket?
    10·1 answer
  • This is not homework but how do you fix this I’ve tried everything
    9·1 answer
  • In 1997, microsoft was accused of using a monopoly in operating systems to control the market for _____.
    8·2 answers
  • How can ICT be a tool in connecting all stakeholders in your community?
    5·1 answer
  • Which of the following is part of the process of publishing a website?
    7·2 answers
  • Question #8
    5·1 answer
  • Does putting a glue stick on your touchpad make it stop working pls help
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!