1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivenika [448]
4 years ago
5

A _____ is a group of two or more devices/computers connected together to allow for the exchange and information and for the sha

ring of resources such as printers.
Computers and Technology
2 answers:
IgorC [24]4 years ago
6 0

Answer:

Network

Explanation:

When you have devices connected together to pass, share and exchange information; this connection is regarded as network.

Take for instance. you need to get a file from your friend's mobile phone; when you connect your phone to your friend's phone via Bluetooth, Xender or via whatever convenient means of connection; that is a network.

Another instance is when you connect multiple systems in a CBT examination; this connection is also regarded as a network.

Marina CMI [18]4 years ago
3 0

Answer:

network

Explanation:

You might be interested in
Which type of financial institution typically has membership requirements?
Anon25 [30]
Credit Union typically has membership requirements
8 0
4 years ago
Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
bagirrra123 [75]

Answer:

Check the explanation

Explanation:

1) The single router approach is a security Implementation of all security policies and the defense-in depth approach employs a firewall. the DMZ approach Is establish between two routers with a firewall.

2) The single router approach is for small offices and homes.

The defense in depth approach is for large organizations.

The DMZ approach is for publicity operated networks.

3) The DMZ can provide better defense because it has more than two firewall for increased security.

5 0
4 years ago
"When a large data file needs to be processed in ascending or descending order based on a particular field, the most efficient a
Alona [7]

Answer:

Yes

Explanation:

For example, We need to write down the names of student in a school for survey purposes, rather than tell everyone to write their names on a sheet of paper and submit, we can instruct that names be written according to their classes and then written on the class sheets alphabetically.

Logically names will be written according to the classes from Class 1 - 10, then on the class sheet alphabetically from A - Z. its better represented that way for easy understanding and better collation and interpretation of data.

7 0
4 years ago
If you add 111 and 0101 in 4-bit signed fields, is there a carry or overflow?
Ghella [55]

Answer: there is an overflow

Explanation:

Here using 4-bit signed fields to store the addition value.

0111 + 0101 = 1100

In above addition the MSB is reserved for sign.

If MSB is 0 means the number is positive.

If MSB is 1 means the number is negative.

The first number 0111 has MSB 0 means it is a positive number.

The second number 0101 has MSB 0 means it is also a positive number.

But after addition the result obtained is 1100 which MSB is 1 indicating the

result is negative number.

How can it be possible to add two positive numbers and get a negative number as result.

This type of situation is called overflow situation.

It is used for error detection purpose.

therefore there is an overflow

4 0
4 years ago
WikiLeaks is a famous not-for-profit whistleblower website. MasterCard and Visa stopped payments to WikiLeaks after a series of
gayaneshka [121]

Answer:

Hacktivists

Explanation:

Hacktivists are individuals who gain unauthorized access to computer networks or information, then use unruly ways to effect social or political change. Hacktivism started as a way of protesting online to effect a change by pushing for a certain outcome. This saw the building of websites such as wiki leaks. Although hacktivists are not entirely driven by malicious intent they employ some tactics used by hackers to drive their message across.

5 0
3 years ago
Other questions:
  • What is the mid-square method?
    6·1 answer
  • The vertical and horizontal scroll bars can be used to aid in navigation throughout the document. true or false
    7·2 answers
  • Which of the following demonstrates the proper way to specify a variable-length argument list?
    7·1 answer
  • Write a C++ program that would take 10 integers and outputs mean, median, and range. Create at least three functions: one for so
    7·1 answer
  • What is the available vector for each resource and the need matrix for each thread. Note that an available vector depicts the qu
    11·1 answer
  • When does the following while-loop stop running?
    10·1 answer
  • Which statement describes a biotic factor interacting with the environment?
    5·1 answer
  • Write an algorithm to sum all numbers between 0 and 1000 that are divisible by ,7​
    8·1 answer
  • Ceteris paribus, if a student could either earn money tutoring or working as a server in a restaurant, then increases to the wag
    5·1 answer
  • Add this in binary numbers . (1100011+11111+111) ​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!