1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
8

Host computer is:

Computers and Technology
1 answer:
N76 [4]3 years ago
8 0

Answer:

A

Explanation:

You might be interested in
Give 2 examples of when spreadsheets are used.
Anni [7]

Answer:

exam result mostly in colleges and high schools

3 0
3 years ago
Why is it important to create a free body diagram
Lynna [10]

Answer:

because you need something to go back on to look at

Explanation: to use notes to there fullest and it will help you in the long run and if you add that to your notes they will be easyer to  look back on and be filled in  

5 0
3 years ago
Read 2 more answers
When describing memory, ____________ is the first component required in the process necessary for retention?
8_murik_8 [283]
Depends on how deep you're willing to go to really,
You need one of a few arrangements of flip flop circuits to keep 1-bit state.
Going deeper, you need either NAND, or NOR gates(or a bunch of other ones) and connectors.
Even deeper, you'll require diodes or transistors to build the logic gates.
Beyond that is particle physics.
8 0
3 years ago
An innovation stream begins with a technological discontinuity, which is a scientific advance or a unique combination of existin
Monica [59]
This is true.

The next step in an innovation stream is an era of ferment, which is later followed by dominant design.
5 0
3 years ago
Authentication technologies are used by many organizations to _____.
sasho [114]

Answer:

C. confirm the identity of a user requesting access to information or assets

Explanation:

Authentication technologies are used by many organizations to confirm the identity of a user requesting access to information or assets. Authentication is used to secure data and ensure access is given to an authorized user. There are four main types of authentication technologies that can be used in an organisation. The first one is the password-based technology where a user provides a user id and a password to gain access to information. There is also a certificate-based technology which uses digital certificates to authenticate users. The third technology is the E-Token Based authentication where a device generates a random number whenever it is used, the number generated can be used in place of a password. The fourth alternative is biometric technology , which identify users by their physical characteristics such as their fingerprints, voice or facial features.

6 0
3 years ago
Other questions:
  • While at work, Joe asked Dana to show him how to change the copier paper. Joe kept working as she explained the process, and the
    5·2 answers
  • How to know your pc does not have bluetooth?
    14·1 answer
  • To close a tab, click the ____ button in the web page thumbnail on the tab switcher.
    9·1 answer
  • Java uses ____ to implement method lookup.A) a jump tableB) an inheritance treeC) restricted accessD) polymorphism
    14·1 answer
  • When a program lets the user know that an invalid menu choice has been made, this is an example of?
    14·1 answer
  • Which of the following is not a type of Internet Job Board? Options Resume Blaster Professional Association Target Applicants We
    8·1 answer
  • Match letters from column B to Column A by looking at the picture above.
    11·1 answer
  • How should you clean the keyboard on your desktop computer? Check all of the boxes that apply.
    6·2 answers
  • Please help with question
    14·1 answer
  • To rename a worksheet, you change the text on the ? HELP ASAP
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!