1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
3 years ago
12

____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a netw

ork (such as the internet or a mobile phone network) to identify another device on the same network and determine its status.
Computers and Technology
1 answer:
SCORPION-xisa [38]3 years ago
8 0
<span>Presence technology is the answer</span>
You might be interested in
I WILL GIVE BRAINIEST ANSWER AND THANKS IF YOU ANDWER THIS QUESTION!!!!
sesenic [268]
Access: full electronic participation in society.
Commerce: electronic buying and selling of goods.
Communication: electronic exchange of information.
Literacy: process of teaching and learning about technology and the use of technology.
Etiquette: electronic standards of conduct or procedure.
Law: electronic responsibility for actions and deeds.
Rights & Responsibilities: those freedoms extended to everyone in a digital world.
Health & Wellness: physical and psychological well-being in a digital technology world.
Security (self-protection): electronic precautions to guarantee safety.

IMPORTANT
Etiquette. Students need to understand how their technology use affects others. ...
Literacy. Learning happens everywhere. ...
Rights and responsibilities. Build trust so that if something happens online, students are willing to share their problems or concerns about what has happened.
6 0
3 years ago
Which option describes wearable technology?
kotykmax [81]
My opinion is the answers A and D. I would choose A if you can only choose one, though.
7 0
3 years ago
Read 2 more answers
In an SLR camera photogaphers look from the viewfinder through which of the following?
Fantom [35]
The answer is A mirror the lens
8 0
3 years ago
Read 2 more answers
Which of the following technologies is the best choice to convey urgent and highly sensitive information? telephone fax letter e
snow_lady [41]
Using e-mail to send messages is the best choice to convey urgent and highly sensitive information. E-mail is just a conversation between you and the recipient. So it is the best when it comes to when you are sending a highly sensitive information. While telephone fax letter and dispatch radio may need to use a mediator to transfer messages which violates the confidentiality of the information.
3 0
3 years ago
At the time of signing, what was the title of the man who is the first of the two names in the name of the 1901 treaty that null
pshichka [43]
The answer is the US Secretary of State.  <span>At the time of signing,Secretary of State was the title of the man (John Hay) who is the first of the two names in the name of the 1901 treaty that nullified the Clayton-Bulwer Treaty. </span>It was signed by US Secretary of State John Hay and British Ambassador to the United States Lord Pauncefote on the 18th of November 1901. 
3 0
3 years ago
Read 2 more answers
Other questions:
  • When troubleshooting firewalls, which of the following is not something you should do after you attempt a fix?
    7·1 answer
  • Discussion group may have a___________ who monitors the postings and enforces the sides rules​
    13·1 answer
  • Answers please !!!!!!!!!!!!!!!!!!!!!!!!!!!
    8·1 answer
  • How to connect a three way switch to a regilar switch?
    9·1 answer
  • How dependent are we on technology? ​
    15·2 answers
  • In 2011 a program named Watson running on an IBM supercomputer
    12·1 answer
  • Which camera mode gives the photographer the greatest amount of control?
    7·2 answers
  • Dimensional arrays can be created using loops. 2 dimensional arrays can be created using:
    10·1 answer
  • When a computer is infected by a virus, _______.
    14·1 answer
  • You hide three worksheets in a workbook and need to unhide them. How can you accomplish this?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!