1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex Ar [27]
3 years ago
10

For most usb devices, power is supplied via ____.

Computers and Technology
1 answer:
ser-zykov [4K]3 years ago
3 0

For most usb devices, power is supplied via the port.

You might be interested in
You have a new phone. What determines what type of messages you can send?
prohojiy [21]
B the services provided by the provider
6 0
2 years ago
Which group of commands all appear on the Standard toolbar?
Komok [63]
<span>The toolbar on the top of screen and menu bar the mean part of commands.</span>
7 0
3 years ago
Read 2 more answers
Melissa is the network administrator for a small publishing company. as network administrator, she is in charge of maintaining t
Arte-miy333 [17]
The answer is an Intruder Prevention System (IPS). An Intrusion Detection System (IDS) will detect an attack but will not block it.
3 0
3 years ago
How do you transfer music from external hard drive to a laptop?
weeeeeb [17]
You could download it to another device, and send the music to the laptop. That, or you can plug it into the USB port.
I hope this helps!
7 0
3 years ago
question 2 what are some types of software that you'd want to have an explicit application policy for? check all that apply.
zaharov [31]

The types of software that you'd want to have an explicit application policy are:

  • Filesharing software
  • video games

  • Explicit application policy are simply refered to as legal rights that are stated regarding ownership or company. It is actual substance of an agreement

  • Video games and filesharing software is of not really important in som business. So therefore, having explicit policies showing why or not this type of software is permitted on systems is okay.

Conclusively, we can say that Filesharing software and video games can require an explicit application policy.

Learn more from

brainly.com/question/12730075

4 0
2 years ago
Other questions:
  • What does nntp stand for?
    12·2 answers
  • You type. The word "weather" when you ment "whether" when will the writer or word flag this as a misspelling or a grammar proble
    13·1 answer
  • Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injecti
    5·1 answer
  • You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store
    10·1 answer
  • 1. What does MS-DOS use for input?
    5·1 answer
  • Whenever Jim starts his laptop he sees some commands and numbers appearing on his screen these instructions are being processed
    9·1 answer
  • Which of the following scenarios is an example of irrelevant media?
    11·1 answer
  • Fill in the blanks: The _____ is useful for predicting future results. A. mean. B.median. C.mode
    15·1 answer
  • Does analogue conversation take place in source as transmitter?
    5·2 answers
  • Personal statements School leaver
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!