1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dem82 [27]
3 years ago
9

Category 6 is an example of a ________ used to connect wired network devices.

Computers and Technology
1 answer:
suter [353]3 years ago
5 0
<span>Category 6 is an example of a cable used to connect wired network devices</span>
You might be interested in
Helppp pleaseee help pleaseee look at picture
ale4655 [162]

Answer:

C & E

Explanation:

Brainlest, Please!

4 0
10 months ago
Read 2 more answers
Explain why regular system cleanup is vital to ensuring the operating system runs efficiently.
Oksanka [162]
Cleaning up a system helps clear up the space on the drives. It may also clear up processor usage, ram usage if you uninstall programs that automatically started when the system booted. You may also delete some unwanted programs in the process.
5 0
3 years ago
What is this screen called? (I attached a picture)
Anna11 [10]

Answer:

graph screen is the correct answer

8 0
2 years ago
Read 2 more answers
There are five processes A to E to run. Their burst times are 3,4,5,2 and 3 seconds respectively. Their arrival times are 0,1,5,
Sholpan [36]

Answer:

Explanation:::::::::::::::

3 0
3 years ago
You work as a Network Administrator for wwwpany Inc. You have suspected a bad driver or perhaps malware. Which of the following
vichka [17]

Answer:

Explanation:

There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.

This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.

En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.

8 0
3 years ago
Other questions:
  • For Adults/Adolescents, you should call/activate EMS: Before providing CPR. After providing CPR for 2 minutes. After an AED has
    13·1 answer
  • _______________creates new markets separate to the mainstream; markets that are unknowable at the time of the technology's conce
    8·1 answer
  • A type of specialty processor devoted exclusively to protecting your privacy.
    9·2 answers
  • Which of these is NOT one of the main parts of an email?
    14·2 answers
  • Which of these are correctly formatted Python tuples? CHECK ALL THAT APPY.
    15·2 answers
  • Which programming languages are the best choices for desktop applications? Select 3 options.
    8·2 answers
  • When converting text to a table, which feature should be used?
    12·1 answer
  • Pleassseeeee helppp!!!!
    7·1 answer
  • Another term for the plot structure of the hero journey
    13·1 answer
  • Explain in brief terms some of the technology and developments that were important in the history and development of the Interne
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!