1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dem82 [27]
3 years ago
11

PLEASE HELP ME ASP!!!

Computers and Technology
2 answers:
Nana76 [90]3 years ago
6 0
This is True...................
Simora [160]3 years ago
3 0

Answer:

It is true

Explanation:

Because it is communicating so the switch gets energy

You might be interested in
Fill the validateForm function to check that the phone number contains a number (use the isNaN function) and that the user name
Wittaler [7]

The answer & explanation for this question is given in the attachment below.

8 0
3 years ago
Quality answers will be appriciated! :)​
Naddika [18.5K]
<h2>1.</h2>

  1. F
  2. T
  3. T
  4. T
  5. F
  6. F
  7. T

________

<h2>2.</h2>

  1. A
  2. B
  3. D5*E5
  4. A

6 0
3 years ago
Read 2 more answers
Most network cards contain a port that accepts a(n) ____, which looks similar to a telephone connector but is larger.
Vadim26 [7]
YOUR ANSWER IS -------- It accepts a RJ-45 connector
hope i helped you :).
take care
8 0
4 years ago
What is property in educational technology
Maslowich
1. It is based on scientific and technological advancements.
2. It is more a practical discipline and less a theoretical one.
3. It is a fast growing modern discipline.
4. It makes use of the research findings of psychology, sociology, engineering, sciences and social psychology etc., and applies the same to the field of education.
5. It brings pupils, teachers and technical means together in an effective way.
6. It is the science of techniques and methods. It locates the problems in the field of education, remedies them and ultimately aims at improving the education system.
7. It is bound to improve the teacher, the learner and the teaching learning process.
3 0
3 years ago
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
NNADVOKAT [17]

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
3 0
3 years ago
Other questions:
  • How many bones are in a human body
    7·2 answers
  • What commands will reset a network interface in Linux?
    13·1 answer
  • Which of the following refers to the data analysis software and interactive software that allow managers to conduct analyses and
    6·1 answer
  • In terms of online safety, what is the grooming process, (predators).
    5·2 answers
  • Write the definition of a function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    10·1 answer
  • If a website ends with .gov does it mean that its written by the government or?
    11·2 answers
  • Making sure that your business has something special and distinct to offer is known as?
    12·1 answer
  • Which of the following is true of a procedure? Check all that apply.
    10·2 answers
  • With which type of satellite is there a propagation delay?
    5·1 answer
  • ________ involves disconnecting individual users from their selected internet service providers and redirecting them to illegiti
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!