1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
3 years ago
8

Lewis is using a stylus with his touch screen computer in order to draw a

Computers and Technology
1 answer:
Drupady [299]3 years ago
4 0

Answer:

imput

Explanation:

You might be interested in
in the topology configuration, hosts are connected to each other through a central controller which assumes all responsibility f
Colt1911 [192]

in the <u>star</u> topology configuration, hosts are connected to each other through a central controller which assumes all responsibility for routing messages to the appropriate host.

Define topology.

When a geometric object <u>is stretched, twisted, crumpled, or bent without closing or opening holes, ripping, gluing, or passing through itself, certain features are kept</u>. This is known as topology in mathematics.

<u>The study of datasets using </u><u>topological </u><u>methods</u> is known as topological-based data analysis (TDA) in applied mathematics. <u>Open sets are a convenient way to define the basic </u><u>topological </u><u>notions of continuity, compactness, and connectedness</u>.

To learn more about topology, use the link given
brainly.com/question/14560531
#SPJ4

3 0
2 years ago
Eva is listening to music while she browses the Internet. Which type of operating system must she be using?
maks197457 [2]
Eva would be using any modern day OS from Microsoft OS to Macbook OS
6 0
3 years ago
Read 2 more answers
What is it called when a additional document is added to an email
LUCKY_DIMON [66]
A new data to save last chest
8 0
3 years ago
Read 2 more answers
CSCU EXAM TEST FINAL1-A software or hardware that checks information coming from the Internet and depending on the applied confi
Nastasia [14]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol can be defined as a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and good performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
When a CPU executes each instruction in a program, it uses a process known as the __________.
lapo4ka [179]

Answer:

The answer is "fetch-decode-execute cycle"

Explanation:

The FDE cycle stands for Fetch-Decode-Execute cycle, It is a computing operation, in which a CPU process, to retrieves the system in its order memory form, it also decides that what instruction is supposed to do, and executes certain activities.  In this process, the operating system loads the files and the program on a disc to the main memory (RAM).

8 0
4 years ago
Other questions:
  • You will extend zyLab3, by adding a Player class and extending the PokemonField class. You will be working with three.java files
    13·1 answer
  • Universal Container sales reps can modify fields on an opportunity until it is closed. Only the sales operations team can modify
    13·1 answer
  • If you’re trying to reduce your debt, which of these expenses should you consider cutting out or cutting back on first?
    5·2 answers
  • To always see the header row with scrolling through long worksheets, you would use the ______ command.
    8·1 answer
  • Can anyone help with this graded assignment for computer fundamentals
    10·1 answer
  • Which type of CPU instruction performs arithmetic calculations and stores the results in memory?
    14·2 answers
  • Each symbol of an octal number corresponds to 3 bits of a binary number. is it true or false​
    5·1 answer
  • Match each code snippet to its appropriate markup language name. XML CSS HTML XHTML<br><br><br>​
    10·1 answer
  • A common hardware component found in electronic devices including desktop computers, laptops, tablets and smartphones. The amoun
    5·1 answer
  • 26. Universal Containers (UC) has a queue that is used for managing tasks that need to be worked by the UC customer support team
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!