1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_tiger [21]
3 years ago
13

To keep a desktop computer or a server powered up when the electricity goes off in addition to protecting against power fluctuat

ions, a(n) ____, which contains a built-in battery, can be used.
Computers and Technology
1 answer:
rosijanka [135]3 years ago
8 0
<span>An uninterruptable power supply or UPS can be used. This has a specific length of time that it can provide power. This is dependent on its age, type, and the number of devices that are attached to it. This can be used for industrial and personal use.</span>
You might be interested in
Which data type does not allow duplicate values-python
kkurt [141]

Answer:

Set

Explanation:

A set is unique in Python. It does not allow duplicates

6 0
2 years ago
Which of the following is a regional accreditation agency?
Sveta_85 [38]

Answer:

A. Middle States Association of Colleges and Schools

Explanation:

The Middle States Association of Colleges and Schools (Middle States Association or MSA) is a non-profit association that performs regional accreditation of schools both public and private  in the Mid-Atlantic region of the United States and for some institutions with an American origin. The MSA has three commissions:

  1. Middle States Commission on Higher Education (MSCHE)
  2. Middle States Commission on Elementary Schools (MSCES)
  3. Middle States Commission on Secondary Schools (MSCSS)
4 0
3 years ago
Dustin is editing a SmartArt graphic. He wants all three shapes to be different colors.
lilavasa [31]

Answer:

click on Design tab → select associated shape → adjust color

Explanation:

I think it is that but i'm not positive. I will know in a little bit since I am taking the test right now.

6 0
4 years ago
Thomas is getting ready for a presentation. His slides are set, and he's
PIT_PIT [208]
B copy the web page of the video that you want to use
5 0
4 years ago
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
tatiyna

Answer:

Nfc relay attack

Explanation:

The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.

This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk

5 0
3 years ago
Other questions:
  • Which payment type is best if you are trying to sick to a budget?
    15·1 answer
  • "The pkill command terminates _________."
    14·1 answer
  • If the boolean expression a is true and b is false, the value of the logical expression a or b is ________.
    14·1 answer
  • What special precautions should you take when detailing a steel-framed building to avoid excessive conduction of heat through th
    9·1 answer
  • For security reasons a network administrator needs to ensure that local computers cannot ping each other. which settings can acc
    5·1 answer
  • In an e-credit card transaction the clearinghouse plays the following role:
    6·2 answers
  • True false) cad means computer aided manufacturing​
    10·1 answer
  • Houston want to have a quick conversion with his friend about an upcoming school activity. which type of website would be most u
    12·2 answers
  • Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
    12·1 answer
  • The parental control service is experiencing technical difficulties.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!