1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lbvjy [14]
3 years ago
8

Many people describes computers as complex machine. what can this mean?

Computers and Technology
1 answer:
Airida [17]3 years ago
8 0
They work in many different ways?
You might be interested in
Which of the following types of access controls do not describe a lock? (a)- Directive (b)- Physical (c)- Preventative (d)- Dete
Mrac [35]

Answer:

Directive

Explanation:

A directive access control is used to direct, confine, or control the actions of subject to force compliance with security policies. Some examples of direct access controls are: security guards, guard dogs, posted notifications, monitoring, supervising, work task procedures, and awareness training. It can also be categorized by how it is implemented; for example, it can be administrative, logical/technical, or physical.

7 0
3 years ago
Which very high-speed fiber network was already in place and being used for wide area networking (wan) transmissions, before the
Stolb23 [73]

The high-speed fiber network that is already in place and being used for wide area networking (wan) transmissions, before the IEEE developed the 10gbe ethernet standards is called SONET.

<h3>What does SONET stand for in networking?</h3>

SONET  is known to be a term that is called Synchronous Optical Network.

This is said to be defined as a standard  that is known to be used in linking or in the act of connecting fiber-optic transmission systems and it is one that is sold in North America only.

Therefore, The high-speed fiber network that is already in place and being used for wide area networking (wan) transmissions, before the IEEE developed the 10gbe ethernet standards is called SONET.

Learn more about fiber network from

brainly.com/question/26259562
#SPJ1

8 0
1 year ago
The _____ establishes that the destination device is present on the network, verifies active service, and informs the destinatio
masya89 [10]

Answer: Three way handshake

Explanation:

The three way handshake is the process in which it established a connection at the destination device in the network. It also verifies the currently active services in the network.

The three way shake process basically uses in the transmission control  protocol(TCP) and it also inform to the destination device about the communication session.

Three way handshake process are properly understand in the TCP segment header by the various values in the two host exchange.

4 0
3 years ago
How can you have a safe browser experience
goldfiish [28.3K]

Most likely the answer is to delete cookies, as it cuts down on the amount of tracking sites can do to you.

6 0
3 years ago
Positive use of the technology before the pandemic.
Nana76 [90]

Answer:

Positive use of the technology before the pandemic. Is to talk to relatives who live far away. Find a Cool Recipe and to be nice online.

Explanation:

4 0
3 years ago
Other questions:
  • A computer application such as Microsoft Access that is used to store data and convert it into information is a ________________
    6·1 answer
  • PLEASE HELP ASAP!!!!
    14·1 answer
  • Which scientific law states that if a light source radiates isotropically, the light intensity falls off the further you get fro
    5·1 answer
  • Kuta software infinite pre- algebra multiplying polynomial and a monomial find product answer key
    14·1 answer
  • Select the correct answer.
    8·2 answers
  • A forensic investigator at a crime lab is performing a forensic analysis of a hard drive that was brought in by state troopers.
    10·1 answer
  • For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f
    9·1 answer
  • Which of the following component is required to insert text in multimedia
    8·1 answer
  • Which of the following keywords allows a subclass to access a superclass method even when the subclass has overridden the superc
    9·1 answer
  • Michelle has defined a custom object by creating an object literal. She wants to access the properties of the custom object. Mic
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!