1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GrogVix [38]
3 years ago
15

A computer with a domain name is called a what

Computers and Technology
2 answers:
Rus_ich [418]3 years ago
8 0
Domain refers to a group of computers that are part of a network and share network resources, like your home<span> computers all linked together sharing a printer. The user logs in to the domain and gains access to the resources. Several systems may be involved. The computer itself is referred to as a server.</span>
Irina18 [472]3 years ago
6 0
A domain refers to a group of computers that are part of a network and share network resources, like your home<span> computers all linked together sharing a printer. The user logs in to the domain and gains access to the resources. Several systems may be involved. The computer itself is referred to as a server.</span>
You might be interested in
After creating the home page or any other page of a website and adding content to it, it must be displayed in a browser to view
konstantin123 [22]

Answer:

The answer is "True".

Explanation:

The web page is also known as a home page when it collects more than one page, it is called website. In web page designing, it uses the HTML for design a page and is also available via the web or other networks.

  • When we insert a URL address to the Web page, it means, it contains the text, graphics, and hyperlinks to other Web pages and files.
  • It also displays all the data on the page, that's why the given statement is true.
3 0
4 years ago
A student is going to give a multimedia presentation comparing the novel The Wizard of Oz by L. Frank Baum to the 1939 movie ver
Alekssandra [29.7K]

Answer:

C.

Explanation:

A line graph can show how both the movie and the novel are compared to each other. It can give a visual of both mediums of the story rather than one or the other. Hope this helped :)

3 0
3 years ago
Read 2 more answers
Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other
quester [9]

Answer:

Option B is correct.

Explanation:

As such an application programmer, Shania recently began a new work. The first assignment was to create an earlier software available on certain devices, developed for Android.  

So, she using cross-platform software to compose application code that might convert the current android application code across various native versions to makes it much simpler and quicker for her job.

Other options are incorrect because they are not related to the following scenario.

4 0
3 years ago
It is a science fiction but the answer is not science fiction.it States ;it's inventiveness,uncertainly and futuristic ideas typ
MAVERICK [17]

Answer:

The uncertainty of inventiveness and futuristic ideas usually deal with science and technology.

Inventibility is something uncertain which promotes a risk in any system in which it is inserted. With that, we can naturally associate it with the maintenance of science and technology, because both are in need of inventing new creations, which may or may not be effective for the defeat of uncertainties and the creation of certainties.

This is usually linked to futuristic ideas, which may not fit in today's society, but which impose improvements, or not, for societies in the future. Leading to the creation of more technologies and more sciences.

3 0
3 years ago
A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed c
BabaBlast [244]

Answer:

B. Spyware

Explanation:

Spywares are silent software that steals sensitive information such as internet or company data, and other similar information. They are oftentimes unnoticed and supply stolen data to external users, data centers or advertisement companies.

Sophisticated spyware can go as far as installing software to manipulate your settings or use passwords on your behalf.

Even though the Trojan was detected in our scenario, The Trojan would have created a backdoor to allow spyware in. This spyware will not be easily noticed by the technician or the antivirus, however, it could be more devastating than the Trojan.

That is why the security administration expresses concern over a breach despite the removal of the Trojan.

3 0
3 years ago
Other questions:
  • Ann wants to download Adobe Acrobat software from the Internet. Prior to downloading, a standardized online contract appears on
    7·1 answer
  • Special effects are added using the _____.
    16·1 answer
  • A machine on a 10 Mbps network is regulated by a token bucket algorithm with a fill rate of 3 Mbps. The bucket is initially fill
    12·1 answer
  • Chunking is a good strategy for completing large assignments because it makes the work
    7·2 answers
  • Wanda manages an application that fluctuates in usage quite a bit. Sometimes it uses quite a few servers with lots of memory and
    14·1 answer
  • What is the meaning of <br>computer<br>viruses ?​
    8·1 answer
  • jeff has just upgraded from windows 7 to windows 10 and he is confused. He has started several universal apps but he can't figur
    11·1 answer
  • Choose the true statement below. (html)
    5·1 answer
  • Select the correct answer.
    5·1 answer
  • 14. The heart of a computer is<br> a CPU<br> b. Memory<br> c. I/O Unit<br> d. Disks
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!