1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
murzikaleks [220]
3 years ago
5

___________ connects different types of computers in LAN?

Computers and Technology
2 answers:
strojnjashka [21]3 years ago
8 0

Answer:

a) Switch

Explanation:

hope this helps you

Alinara [238K]3 years ago
8 0
A and b because I’m great
You might be interested in
An organized file title helps save time locating files, communicates professionalism, and lets us know the file is most likely N
Shkiper50 [21]

An organized file title helps save time locating files, communicates professionalism, and lets us know the file is most likely not a virus: True.

A file can be defined as a computer document or resource which avails an end user the ability to store (record) data as a single unit on the storage device of a computer system.

Generally, all files are identified and organized based on the following criteria:

  • Name (Title).
  • Format (Type).
  • Size.
  • Date.
  • Status.
  • Owner.
  • Permission.

Based on the aforementioned criteria, an organized file title would help to save time locating files, communicates professionalism, and lets us know the file is most likely not a virus because it must have been scanned with an antivirus utility.

Read more: brainly.com/question/23728214

6 0
2 years ago
Which data type requires the greatest number of bytes in computer memory?
xxMikexx [17]

Answer:

Double precision number

Explanation:

The IEEE has given some Standards for representing numbers

IEEE Standards for floating point numbers is common convention for representing numbers in binary on Computers.

Double precision number format takes up 64 bits.

Single precision number format takes up 32 bits

4 0
3 years ago
can you imagine what life might have been like before the internet laptops and smartphones were part of everyday life what are s
svet-max [94.6K]

Answer:

no

Explanation:

it does not matches me

7 0
2 years ago
Read 2 more answers
Ann, a user, reported to the service desk that many files on her computer will not open or the contents are not readable. The se
ycow [4]

Answer:

The computer has been infected with crypto-malware

Explanation:

From the question, we are informed about Ann, a user, reported to the service desk that many files on her computer will not open or the contents are not readable. The service desk technician asked Ann if she encountered any strange messages on boot-up or login, and Ann indicated she did not. In this case, What is MOST likely to occurred on Ann's computer is that the computer has been infected with crypto-malware.Crypto-malware can be regarded as one of the malware threats that very common, and very insidious compare to some malware because it can't be easily detected. It is known as one of the malware that steal data and can hide in background for long mining there

7 0
3 years ago
If you key a paragraph in uppercase and need to change it to sentence case without having to re-key the paragraph, which option
bazaltina [42]

Answer:

I found the answer on quizlet and it said "sentence case" i don't know if its right but hope it helps

6 0
2 years ago
Other questions:
  • You have been tracking your exercise routine, which involves running, lifting weights, yoga, and stretching. You want to see wha
    15·2 answers
  • All the processing-of work-done on a computer is performed by the what?
    11·1 answer
  • Which element of the security policy framework requires approval from upper management and applies to the entire organization?A.
    5·1 answer
  • An installed theme can be applied by clicking on a theme in the themes group on the ____ tab.
    7·2 answers
  • What trade-offs do you think engineers make between functionality, safety and aesthetics when building a real bridge?
    9·1 answer
  • Describe all the steps a router goes through while deciding where to send the a packet. Explain why a router would choose one ro
    7·1 answer
  • CORRECT ANSWER GETS BRAINLIEST PLEASE HELP !
    14·1 answer
  • Design a class named Person with fields for holding a person's name, address, and telephone number (all as Strings). Write a con
    15·1 answer
  • Which block in this module represents the variable?
    8·1 answer
  • Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes su
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!