1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
3 years ago
8

How do i stream from my chromebook to my tv?

Computers and Technology
1 answer:
pychu [463]3 years ago
6 0
If you want to stream youtube there should be a cast button if your using the same wifi as your tv and if its a smart tv or you have a chrome cast 
You might be interested in
To activate the Table Tools tab, _____.
igor_vitrenko [27]

Answer:

The answer is "select the table"

Explanation:

3 0
4 years ago
Code written by computer programmers is translated to binary code, so computers can understand the instructions. True or False
san4es73 [151]

Answer:

True

Explanation:

High-level languages such as Java, C++, Ruby, Python, etc need to be translated into binary code so a computer can understand it, compile and execute them.

Machine language is the only language that is directly understood by the computer because it is written in binary code. But writing codes in Machine Language is tiring, tedious, and obsolete as no one really uses it anymore.

7 0
3 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
Maya wrote a program and forgot to put the steps in the correct order. Which step does Maya need to review? Pattern following Pl
Drupady [299]

Answer:

Sequencing

Explanation:

7 0
3 years ago
Read 2 more answers
What are some of the strategies that you use for confronting a complex problem and breaking it down into smaller pieces? How mig
bazaltina [42]

Answer:

Breaking it down I guess for me, you could take down all the possible things that you could do. Eliminating things, one by one. It could help working on a computer by not letting yourself get over-whelmed by all your programming and thinking "alright, this THEN this."

Explanation:

8 0
3 years ago
Other questions:
  • which resource do programmers sometimes have to refer to and use during planning the logical steps of the solution
    15·2 answers
  • Why is the total number of cylinders in an engine an even number?
    11·1 answer
  • What is qwerty and why is it on the keyboard?
    15·2 answers
  • Please I need all the help I can get
    11·1 answer
  • Creating a Graphical User Interface in Java
    11·1 answer
  • Having friends who cause you stress can decrease your happiness, which can in turn
    13·2 answers
  • 21. If you want to improve the performance of your PC, you need to upgrade the
    7·1 answer
  • What type of software repairs or improves a larger application that is already installed on a system?
    9·2 answers
  • MCQ: Which of the following network is confined to a relatively small area?
    5·2 answers
  • Why do relational databases use primary keys and foreign keys?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!