1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
3 years ago
9

How does hardware differ from software

Computers and Technology
1 answer:
joja [24]3 years ago
4 0

Answer:

hardware is a physical installation while software is onling and not a physical thing u can touch u know?

You might be interested in
Everybody at a company is assigned a unique 9 digit ID. How many unique IDs exist?
Brut [27]
If you include all zeroes, then it should be 1,000,000,000. Otherwise it’s 999,999,999.

Think of how between 0-9 theres 10 numbers, and use that logic towards 000000000-999999999
3 0
3 years ago
When’s The release date for Mobile legends project next phase 3 going To come
Gennadij [26K]

Answer: This Project will involve Hero Revamps, Hero Adjustments, Hero Remodels, and much more. Project NEXT is divided into 2 phases: the first phase was released on September 22, 2020, the second phase was released on June 15, 2021 and the third phase is to be released on "September 2021".

4 0
3 years ago
Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on you
Brums [2.3K]

Options:

A Infrastructure mode

B Ad hoc mode

C a wireless access point

D static IP addresses

E APIPA

Answer:

A. Infrastructure mode

C. a wireless access point

Explanation: A DHCP is a server that makes use of s standard protocol called dynamic host configuration protocol to automatically assign internet protocol (IP) addresses and other computer parameters to clients. It gives them the opportunity to effectively make use of other network services such as DNS( domain name system) and NTP(network time protocol).

8 0
3 years ago
Suppose your school’s computer lab provides high-end architecture software that can be accessed from any lab computer, but a max
LenKa [72]

Answer:

Multiple-user licence.

Explanation:

A multiple-user licence allows the software to be accessed by the maximum number of users specified within the licence. In this scenario, it is 5 students, the connections are concurrent, meaning at any given time there can only be five users running the software. The software can be installed on more than 5 computers, but the number of active users is limited to 5.

3 0
3 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
Other questions:
  • An airline company would like to easily locate lost luggage. What technology would make it easier for them to locate the luggage
    6·2 answers
  • How do the World Wide Web and the Internet work together?
    11·1 answer
  • All living organisms make up the (4 points)
    8·1 answer
  • The filter feature in excel allows you to look at what Data?
    7·1 answer
  • Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only
    8·1 answer
  • The ______ printers are the most popular type of printer in small office/home office and large office environments.
    5·1 answer
  • Which of the following statements best reflects the pros and cons of overtime potential for a line installer or repairer?
    15·1 answer
  • A printer is considered to be in the category of
    5·2 answers
  • 3 uses of a computer ​
    12·2 answers
  • Cybersquatters:_________.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!