1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zepler [3.9K]
3 years ago
5

Create a Word document or text file named Part3 that contains answers to the following:

Computers and Technology
1 answer:
Gnoma [55]3 years ago
4 0

Answer:

11111

Explanation:

You might be interested in
If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is b
3241004551 [841]

Answer:

The correct answer to the given question is " Star Topology ".

Explanation

In the star topology, all the devices are connected to one central device in the network. It means every individual device is connected individually with the central device in the network.

The main drawback of star topology is that if the central device fails then all the device which are connected with them is also failed. The second drawback of star topology is to connect with the central device it requires more cabling.

8 0
3 years ago
A man-in-the-middle attack or impersonation are likely to result in problems with
Ivan

Answer:

Data Confidentiality

Explanation:

A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.

6 0
3 years ago
Web designers use programming languages to write websites. A True <br> B False​
KonstantinChe [14]

Answer: False

Explanation:

Web designers are not using programming languages to write websites.

6 0
3 years ago
Read 2 more answers
Who are the founders of Microsoft?
vekshin1

Answer:

Bill Gates, Paul Allen

Explanation:

The two founders of the mega-tech giant are Bill Gates, and Paul Allen. Hope this helps!

8 0
4 years ago
A method in a class that modifies information about an object is called a/an ____ method.
exis [7]
<span>A method in a class that modifies information about an object is called a <u>mutator</u> method.</span>
7 0
3 years ago
Other questions:
  • In a student​ database, a row that describes the top​ student, including his or her​ lastname, firstname, and​ studentnumber, is
    9·1 answer
  • The title bar of a window tells you the name of the document or program that's being displayed in the window, and it also serves
    11·1 answer
  • You want to display the process of raising a scholarship request and its approval on a slide. Which element in the presentation
    5·1 answer
  • Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software progra
    5·1 answer
  • Suppose we provide a new implementation of the transport layer protocol tcp providing the same functionality using different alg
    14·1 answer
  • You are asked to design a system of FP numbers representation (with your own design choices), labeled Custom_FP_48, for which we
    8·1 answer
  • A report has a column of totals, with each total adding to the cell above it. What kind of calculated figure is this?
    15·1 answer
  • Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
    8·1 answer
  • List the two page orientations in Microsoft word​
    10·1 answer
  • The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and phone needs. Gr
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!