1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Irina18 [472]
4 years ago
14

Please help

Computers and Technology
1 answer:
koban [17]4 years ago
3 0
1 . NT file system
Method of storing files used by Microsoft

2 . Installation
The process of putting software on the computer for use

3 . Boot partition
Section of the hard drive where the boot loader program is stored

4 . Upgrade
The process of installing a new version of software to improve performance

5 . File allocation system
Method of storing files used by many different types of computers

6 . Transmission Control Protocol/Internet Protocol
Two separate standards used together that define how data is sent and received across a network

7 . Device driver
Program that controls a piece of hardware

8. Partition
Section of a hard drive used for file storage

9. System partition
Section of the hard drive where the operating system program is stored
You might be interested in
Modern fax machines use _______ to transmit text.
KatRina [158]
Modern fax machines use senors to transmit text.
hope this helps:)
3 0
4 years ago
Read 2 more answers
Discuss the OSI Layer protocols application in Mobile Computing
Oduvanchick [21]

Answer:

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.

7 0
3 years ago
Which printing method transfers the ink from a metal plate to a rubber blanket?
gizmo_the_mogwai [7]

Answer:

B. Offset printer is the correct answer

7 0
3 years ago
What invention during the renaissance period enabled people to purchase music for their own personal use?
bogdanovich [222]
Printing press_____________________________________________________                                                        
6 0
3 years ago
Read 2 more answers
Suppose 8 people want to communicate with each other using public key encryption. The communication between any pair of them is
ludmilkaskok [199]

Answer:

The answer is "64"

Explanation:

There has been 1 Private Key 1 Public Key for every person. The private key is used for other app messages. All else uses the Public Key to encrypt messages with that user. Those keys are numerically related. Even if you have 5 users, you will be given 5 Personal keys and 5 Public keys.

  • All user will have a duplicate of other public keys, which indicates (n*n-1) copies of n public keys on different systems to make sure shared contact between all users, plus n private keys.
  • The unique key count is 2n, with n^2 distributed private and public keys on different systems.
  • 8 people,  where 8 is a number, that is equal to n so, n^2 = 8^2 =8 \times 8 = 64
5 0
3 years ago
Other questions:
  • At the end of your presentation, the main points should be a. Summarized c. Handed to your teacher b. Written on the board d. Re
    7·2 answers
  • When a file has been opened using the 'r' mode specifier, which method will return the file's contents as a string??
    12·1 answer
  • A 10MB file is compressed into a 2MB file for storage. What is the compression ratio?
    6·1 answer
  • EDI stands for__________________ a) Electronic digital interface b) Electronic data interchange c) Enterprise data interface d)
    5·1 answer
  • Which of the followings is design tool?[2 marks]
    8·1 answer
  • Pick an appliance or an electronic device that you use at home that is powered from the wall outlet. Specify which electronics d
    10·1 answer
  • Should Manufacturers Include Extra Programs in Operating Systems for Computers and Mobile Devices?
    10·1 answer
  • Alice has an item x and Bob has a set of five distinct items y1, y2, y3, y4 and y5. Design a protocol through which Alice (but n
    14·1 answer
  • How to transfer bookmarks from one computer to another.
    13·1 answer
  • If you click on repeat header rows what will happen?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!