1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ostrovityanka [42]
4 years ago
5

NOS stands for _____.

Computers and Technology
1 answer:
Andre45 [30]4 years ago
5 0

there are different ones like

Not Otherwise Specified

Network Operating System

You might be interested in
A result of the Gibbons v. Ogden (1824) decision was that states​
rjkz [21]

Answer:

Explanation:

Gibbons v. Ogden (1824) was a historical decision, where the congress of the United Stated wants to regular interstate commerce. This was a legal fight about the potential of the new steamboat navigation, in the Supreme Court of the United States between the best layers in those days.

This decision of the U.S. Supreme Court was Congress had the right to regulate interstate commerce.

4 0
3 years ago
Which part of the cpu accepts data?
V125BC [204]

The answer is the Processor register.

5 0
3 years ago
PLEASE WRITE A ONE SENTANCE SUMMARY, WILL GIVE BRAINLIEST!! (history of computers) You have completed an extensive investigation
vladimir1956 [14]

Answer:

Charles Babbage, (born December 26, 1791, London, England—died October 18, 1871, London), English mathematician and inventor who is credited with having conceived the first automatic digital computer.

Explanation:

The idea of mechanically calculating mathematical tables first came to Babbage in 1812 or 1813. Later he made a small calculator that could perform certain mathematical computations to eight decimals. Then in 1823 he obtained government support for the design of a projected machine, the Difference Engine, with a 20-decimal capacity. The Difference Engine was a digital device: it operated on discrete digits rather than smooth quantities, and the digits were decimal (0–9), represented by positions on toothed wheels rather than binary digits (“bits”). When one of the toothed wheels turned from nine to zero, it caused the next wheel to advance one position, carrying the digit. Like modern computers, the Difference Engine had storage—that is, a place where data could be held temporarily for later processing.

6 0
3 years ago
Write a note on antispyware progrmaes?​
MAXImum [283]

Answer: See explanation

Explanation:

Spyware refers to the software that has

a malicious behavior which gathers information about an individual or organization and then sends the information gathered to another entity which is used in causing harms to the user such as the privacy violation of the user.

Antispyware programmes are also called the spyware removal tools and they're the software which are used in the detection of harmful spyware which are then removed from the system. Examples include Avira, Norton, Avast, McAfee etc.

5 0
3 years ago
Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the b
hoa [83]

Answer:

Option A i.e., AES is correct.

Explanation:

The user corporation is installing the wireless server and seems to be worried when anyone representing the rival corporation might stands outside that property as well as gather wireless information. He ensured that corporation which WPA2 is safe. However, AES creates WPA2 stronger than WPA.

  • Option B is incorrect according to the following scenario because it is the security mechanism used when component through the IEEE 802.11i WLAN standard.
  • Option C is incorrect according to the following scenario because it is the protocol initially developed for configure wireless clients to such a dial-in connection device.
  • Option D is also incorrect according to the following scenario because it is the terminal access control.
6 0
4 years ago
Other questions:
  • 5. You just bought a new hard drive for your computer. You plan to use this as a secondary hard drive to store all your UMA file
    14·1 answer
  • Create a class called Clock to represent a Clock. It should have three private instance variables: An int for the hours, an int
    15·1 answer
  • Unlike the String class where you must pass a message to an object (instance) of the class, as in x.length( ), in order to use e
    12·1 answer
  • List three uses of the INTERNET
    9·2 answers
  • Do routers have ip addresses? if so, how many?
    10·1 answer
  • What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?
    15·1 answer
  • select the correct answer from each drop-down menu. “To clean a computer screen, use ___. To clean a keyboard, use a ___.”
    7·1 answer
  • suspect that several users are attempting to install unauthorized software. Upon researching, you discover that the attempts wer
    12·1 answer
  • ____ is a technology that exists inside another device
    9·2 answers
  • What is the importance of server modules and add-ons?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!