1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
3 years ago
5

What is computing networking​

Computers and Technology
1 answer:
andre [41]3 years ago
6 0
A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.
You might be interested in
Clunker Motors Inc. is recalling all vehicles from model years 2001-2006. A bool variable named norecall has been declared . Giv
nikitadnepr [17]

Answer:

The statement (in Python) is as follows:

recalled = modelYear >=2001 and modelYear <=2006

Explanation:

Required

A statement without an if statement to assign true or false to recalled

Using an if statement, the comparison is

if modelYear >=2001 and modelYear <=2006:

    recalled = True

else:

    recalled = False

To rewrite the statement without using the "if" keyword, we simply equate variable recalled to the stated condition i.e.

recalled = modelYear >=2001 and modelYear <=2006

Note that, we assume that there is an input fo variable modelYear

8 0
3 years ago
Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing at
Zepler [3.9K]

Answer:

Phishing Victim

Explanation:

Replying to this email could make you a victim of a phishing scam. Phishing attacks are common challenges on security that internet users are faced with. It could lead to others getting hold of sensitive information like your password or bank details. email is one way the hackers used to get this information. replying to such an email could lead one to an unsecure website where information could be extracted

4 0
3 years ago
Which generation experienced a generation gap?
Alex_Xolod [135]

Answer:

B. Baby boomers (the boom generation)

Explanation:

They went against everything their parents said. Also I took a test on it and got it right.

7 0
3 years ago
Que problema se puede usar con el uso de las TIC ?​
raketka [301]
We do not speak English in this please translate in Google because we do not know Spanish
8 0
3 years ago
If you see someone harassing someone else online you should ​
Sever21 [200]

Try to say something yourself, but if you are too scared, get an adult involved. The one bad thing you could do is ignore it.

4 0
4 years ago
Read 2 more answers
Other questions:
  • List the final state of the cache, with each valid entry represented as a record of &lt; index, tag, data &gt;.
    15·1 answer
  • When installing a device driver, start the computer in
    14·1 answer
  • A model release can be either oral or written down. true or false
    11·2 answers
  • a mobile base in an urban environment has the power of 15 microW at 175 m. If the propagation follows an inverse cube power law,
    11·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    7·1 answer
  • Which of the following companies develop, own, and provide travel products for people?
    8·1 answer
  • Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. T
    9·1 answer
  • Which of these is an application to control
    12·1 answer
  • Question 9 (1 point)
    14·1 answer
  • Technology that verifies a person's identity is _____. a smart card Automated Fingerprint Verification an EPD a digital ink pen
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!