1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
4 years ago
5

In a network, a computer that performs specific services for other computers on the network is called a

Computers and Technology
1 answer:
klio [65]4 years ago
8 0
Motherboard or main sequence processor 
(either that  a mainframe or a server)
hope this helps

You might be interested in
Usually, in organizations, the policy and mechanism are established by the:
Ivanshal [37]

Answer:

Sorry Sorry Sorry

Explanation:

Sorry Sorry Sorry

5 0
3 years ago
Read 2 more answers
QUESTION 1 Someone may choose to own a car instead of leasing because: AThe car can be resold later to make some money back. BTh
Lorico [155]
This is not a computers and technology question but ill still answer it and the answer to this that i think it is ...A ...but i may be wrong
3 0
3 years ago
Which of the following is an attack that adds SQL statements to input data for the purpose of sending commands to a database man
liq [111]

Answer: SQL Injection

Explanation:

The SQL injection is one of the type of attack which is used in the database management system for sending the commands by adding the structured query (SQL) language statement in the form of input data.

  • The SQL injection is the technique of code injection in which the SQL statement for the purpose of sending commands.  
  • It is widely used in the data driven applications.
  • The various types of web applications and web pages are used the SQL injection and uses in the form of input in the SQL query and then it is executed in the database.

Therefore, The SQL injection is the correct option.

5 0
3 years ago
A lead views a specific page on your website, say, your case study page. You then send targeted follow-up content like one of yo
IRINA_888 [86]

Answer:

Behavioral Email                                

Explanation:

A behavioral email is an automated email which is sent to recipients on the basis of their behavior. These emails are sent after a user communicates with a business on social media, the company’s website, email, and other communication medium. Behavioral emails help to grow customer involvement and sales. Behavioral email can also be used as a marketing strategy, used by marketers to gather data about an email subscriber in order to send targeted content to that subscriber on the basis of his behavior or actions. When the marketer sends an email to the customer, it is appropriate for that customer, based on the data gathered and their current monitored behavior. Behavioral email helps to understand costumer needs. It helps to get an idea of a customers preferences by inspecting his behavior.

5 0
3 years ago
Running fewer applications at once is a way to resolve which type of bottleneck?
vichka [17]
The answer is <span>memory.  </span>Running fewer applications at once is a way to resolve the bottleneck in <span>memory.  </span>Run fewer programs at the same time and restarting a PC regularly, is a good way to clear out its memory.
6 0
3 years ago
Other questions:
  • Determine the value of base x of (211)x=(152)8
    8·2 answers
  • How many electrons are there in an atom of carbon? A. Four B. Eight C. Six D. One
    15·2 answers
  • The _______________ database structure is considered one of the key technologies of a new generation of Web-based applications.
    7·1 answer
  • Translation of a file into a coded format that occupies less space than the original file is called
    15·1 answer
  • Write a program that completes the following requirements in C program:
    14·1 answer
  • Sensing that the future of computing was in personal computers and that computers' power would reside not in their size but in t
    5·1 answer
  • A horse is how much percent more powerful than a pony
    11·1 answer
  • 10. Question<br> What are the drawbacks of purchasing something online? Check all that apply.
    5·1 answer
  • Name the Python Library modules which need to be imported to
    5·1 answer
  • Technical safeguards involve the hardware and software components of an information system. group of answer choices true false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!