1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
3 years ago
12

____ indicates the number of pixels that a computer uses to display the letters, numbers, graphics, and background on a screen.

Computers and Technology
2 answers:
mylen [45]3 years ago
6 0
Screen resolution would probably be the answer.
ELEN [110]3 years ago
4 0

Answer:

The correct answer is: screen resolution.

Explanation:

Screen resolutions refer to the number of pixels in a given area, the greater the number of pixels on a screen or image, the higher the resolution and definition. We understand by pixel, the minimum homogeneous unit that is capable of projecting a digital screen.

In other words, the resolution of a device is the number of pixels that it is capable of displaying, expressed in terms of its width and height. For example, if a monitor has a resolution of 1920 x 1080 pixels, it means that the monitor is 1920 pixels wide and 1080 pixels high.

There are different types of screen resolution, which will be established depending on the capacity of the equipment or the graphics card we have. For example, an old television will not be able to display images with high definition, and something similar happens with computer equipment.

An example of the benefits of using a higher resolution on computers is the possibility of displaying a larger number of objects on the screen: just modify for a moment the screen resolution shown to see how the number of elements that fit in our desktop increases considerably.

Also when surfing the internet, the importance of using an appropriate screen resolution is clear, as the number of web pages that are optimized based on a specific configuration is increasing, without which it is possible that, for example, some of the items cannot be displayed properly.

You might be interested in
Changing how information is represented so that it can be read by a computer is called
Jobisdone [24]

Answer:

Your answer is D) Encode

Explanation:

Definition of Encode: To change how information is represented so that it can be read by a computer.

7 0
2 years ago
a customer receives a message from the bank asking him/her to provide login information. assuming the message is intended to def
gizmo_the_mogwai [7]

The type of infiltration technique used here is phishing. Phishing is a form of social engineering attack that is often used to obtain user information such as login and credit card information.

Phishing is a type of social engineering in which an attacker delivers a false (e.g. fake, fake, or other deceptive) communication designed to trick a person into providing critical information to the attacker, or to install malicious software, such as ransomware, on the victim. infrastructure.

Phishing attacks are becoming more sophisticated and often transparently mirror the website being attacked, allowing the attacker to track everything the victim is doing there and bypass other security barriers with them.

By far the most common attack by hackers as of 2020, according to the FBI Internet Crime Complaint Center, which records more phishing incidents than any other type of cybercrime combined.

To know more about phishing click here:

brainly.com/question/24156548

#SPJ4

7 0
11 months ago
which endpoint application runs on an endpoint device that only detects an attack in an endpoint device? chqgg
WARRIOR [948]

A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.

<h3>What is Host-Based IPS?</h3>
  • A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.
  • The Host-based Intrusion Prevention System (HIPS) guards against malicious software and other activities that aim to harm your computer. HIPS uses sophisticated behavioral analysis in conjunction with network filtering's detection capabilities to keep track of active programs, files, and registry keys.
  • The integrated endpoint security system known as endpoint detection and response (EDR), also referred to as endpoint threat detection and response (ETDR), combines real-time continuous monitoring and gathering of endpoint data with rules-based automated reaction and analysis capabilities.

To learn more about Host-Based IPS refer to:

brainly.com/question/20490376

#SPJ4

5 0
1 year ago
Which of the following hacker attacks against wireless networks are virtually undetectable?
Ede4ka [16]

Answer: A. passive attacks

Explanation:

Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.

A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.

Methods of carrying out passive attacks.

•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.

•Dumpster driving: Attackers or intruders search for information from discarded computers and

other gadgets, those information can help to attack a network.

7 0
3 years ago
Why do TV shows/Movies from the 90's and early 2000s look so much different compared to today?
icang [17]
Back then, movies were black and white because they had cameras that could only see black and white. In the late 1900's and early 2000's, they developed color cameras. But the common resolution and screen size was 640x480 or 4:3. Nowadays, in the late 2000's and early 2010, the widescreen format was more commonly used for many reasons. Today, the common colors are RGB 1M colors, and the resolution is 16:9. Some movies like to go even farther, like me, and use 21:9,which is super widescreen. That is more immersive than 16:9, and gives the watcher a wider, better experience. 
7 0
3 years ago
Other questions:
  • 1).
    12·1 answer
  • Write a C program that reads a string containing text and nonnegative numbers from the user and prints out the numbers contained
    6·1 answer
  • What is the purpose of the BBC option in a email?
    7·1 answer
  • Write an application named [LastName]_MultiplicationTable and create a method that prompts the user for an integer value, for ex
    11·1 answer
  • Which style of leadership would be most helpful to Charles in the following situation? Charles has just started an internship at
    15·1 answer
  • Bluetooth © and Wifi are two examples of transmission protocols. Which of the following statements about them is true?
    9·1 answer
  • i got a set of headphones and when i plug them into my speakers the right side only works how do i fix the left side of them
    12·1 answer
  • Use the drop-down menus to describe how Adnan can add shapes to his presentation.
    11·1 answer
  • PLEASE HELP!! WILL MARK BRAINLIEST!!
    9·1 answer
  • Which of the following is a productivity strategy for collaboration?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!