1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
10

A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.

Computers and Technology
1 answer:
kolbaska11 [484]3 years ago
7 0
The answer would be a network

You might be interested in
Which of the following is the best example of potential energy?
Otrada [13]
<span>Potential energy is the energy that is stored in an object due to its position relative to some zero position ,so the answer is " A runner positioned at the start line"</span>
6 0
3 years ago
Read 2 more answers
How do you report someone on Brainly?
morpeh [17]

Answer:

dont think u can actually report someone, pero u can report their questions/answers by clicking on the little flag icon and selecting why u want to report them. if they get reported enough they can be banned for about a day or so,, or they could get permanently banned

Explanation:

4 0
4 years ago
John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
xeze [42]

Answer: Mutual authentication

Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.

In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.

8 0
3 years ago
Read 2 more answers
You have installed a streaming video service on your network. You want selected hosts to be able to access this service via a dy
vitfil [10]

You can add the MAC addresses of hosts that you want to allow the access in a database, if you are working on a large scale, and then compare the MAC address of the user in you network wall and allow th users that are allowed.

Or if you are working on a small scale then in your program you can save the MAC in an array or model class and compare when the user will access.

6 0
3 years ago
Why is graphics important in multimedia application <br>​
erastova [34]
Graphics are important in multimedia application this is because humans are visually oriented etc.
5 0
3 years ago
Other questions:
  • A derived character that is shared by all members of a clade is called a ______________ of that clade.
    6·1 answer
  • C++
    8·1 answer
  • Common types of possessed objects are smart cards, rfid-encoded badges, magnetic cards, ____, and smartphones that are swiped th
    7·1 answer
  • For a class project, Jerome builds a simple circuit with a battery and three light bulbs. On his way to school, Jerome drops his
    9·1 answer
  • Which is the most effective manner to deliver a speech inmost business settings?extemporaneous presentationmemorizationreadingvi
    9·1 answer
  • An oligopoly is a unique market structure. Which of the following is NOT necessary to have a oligopolistic market structure?
    10·1 answer
  • Dis-cord and/or snap????????????? Im 13 ! and a girl :)))))
    12·2 answers
  • PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
    15·2 answers
  • All Office programs have similar commands on the tab for changing the document view a. File b. View c. Locate d. display ​
    5·1 answer
  • Dropdown Complete the sentence. To protect a web-based database, you should apply to any online forms that add data to it. princ
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!