1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8_murik_8 [283]
4 years ago
7

A communications system connecting two or more computers is called a(n) ________.

Computers and Technology
1 answer:
stira [4]4 years ago
7 0

it is called a network

You might be interested in
List the six external parts or "peripherals" of a computer system and identify which are output and which are input devices/ Lis
vitfil [10]
Keyboard-Input
Mouse-Input
<u></u>Monitor-Output
Speakers-Output
Printer-Output
Hard Drive<span>-Output</span>
3 0
3 years ago
Some Web sites impose certain rules for passwords. Write a function that checkswhether a string is a valid password. Suppose the
Levart [38]

Answer:

def check_password(pwd):

   c=0

   d=0

   for i in pwd:

       if (i>='a' and i<='z') or (i>='A' and i<='Z'):

           c+=1

       elif i>='0' and i<='9':

           d+=1

           c+=1

   if len(pwd)==c and d>=2 and len(pwd)>=8:

       print("valid password")

   else:

       print("Invalid password")

 

ps=input("Enter password for checking : ")

check_password(ps)

Explanation:

  • Loop through the password and check if it contains any alphabet.
  • Increment the counter if it contains any alphabet.
  • If it contains a number, increment both c and d variables.
  • Finally display the relevant message.
6 0
3 years ago
GIVING BRAINLIEST! AND 100 POINTS.
Natalka [10]

Answer:

Communication

Explanation:

Communication is the most common thing to do on your device .

5 0
2 years ago
Read 2 more answers
How do you handle sensitive data?
arlik [135]

  1. <em>Take stock. Know what personal information you have in your files and on your computers.</em>
  2. <em>Scale down. Keep only what you need for your business.</em>
  3. <em>Lock it. Protect the information that you keep.</em>
  4. <em>Pitch it. Properly dispose of what you no longer need.</em>
  5. <em>plan </em><em>ahead</em>

<em>hope </em><em>it</em><em> helps</em>

7 0
3 years ago
China sends a computer virus that shuts down telephone service in the United States. In retaliation, the United States hacks int
Brrunno [24]

In the case above, it exemplifies how the United States can be both victim and perpetrator of cyberattacks.

<h3>What are cyberattacks?</h3>

A cyber attack is known to be a form of an online assault that is said to be launched by a lot of cybercriminals through the use of one or more computers against a single or a lot of computers or networks.

Note that In the case above, it exemplifies how the United States can be both victim and perpetrator of cyberattacks as it is an online assault.

See options below

a. establishes military superiority

b. can be both victim and perpetrator of cyberattacks

c. places a low priority on cyberattack protection

d. has nothing to fear from cyberattacks

Learn more about computer virus from

brainly.com/question/26128220

#SPJ1

6 0
2 years ago
Other questions:
  • The refrigerant line for single-zone, mini split air conditioners are usually connect by
    9·1 answer
  • What is a software that allows the user to modify and redistribute?
    11·1 answer
  • Why does Microsoft release new versions of its Windows operating system every few years?
    10·1 answer
  • What is SoC? how is it different from CPU?
    14·1 answer
  • The question of ________ arises when considering the way in which online marketers gather consumers’ information over the Intern
    6·1 answer
  • A professional photographer working for a top newspaper would like control over the quality and editing
    14·2 answers
  • Linux implements _________ to determine how a user is to be authenticated and whether there are password policies associated wit
    11·1 answer
  • In which type of class methods is it typically necessary to filter bad arguments (either directly or indirectly with the help of
    13·1 answer
  • Choose the function described.
    6·2 answers
  • Understanding that protection of sensitive unclassified information is:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!