1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady bird [3.3K]
3 years ago
11

This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection.

Computers and Technology
1 answer:
kow [346]3 years ago
3 0

Answer:

3

Explanation:

You might be interested in
Does technology always follow the science, yes or no and explain the reason your choice
kari74 [83]

Answer:

<h2>NO</h2>

Explanation:

<h2>because Technology does not always follow science but it may actually lead science in some instances. An example is weather forecasting.</h2><h2>Mark me brainliest plz</h2>
7 0
2 years ago
Who is in the age range of 13-15 and wants to join a mine craft smp?
Ratling [72]

Answer: Wow that's really cool!

3 0
2 years ago
How does a router handle a packet destined for a network that is not listed in the routing table?
kogti [31]
The packet is dropped or discarded. By default, a router will send packets to a network that has been listed in the routing table. If it happens that the network is not listed, the packet will be discarded or dropped. Packets that do not have a default route or gateway of last resort are dropped.

 






5 0
3 years ago
Which of the following best explains why algorithms are written in the design phase?
Annette [7]

Answer:

D. Algorithms need to be written in the design phase so they can be translated into code in the development phase.

Explanation:

5 0
3 years ago
One type of CAPTCHA is ________. a rootkit virus the wavy hard-to-read letter and number sequence that you type to prove that yo
sergejj [24]
<h2>password method</h2>

Explanation:

Rootkit virus is one type of virus which is hidden about its existence and tries to affect the maximum number of system.

Password method: This is a graphical method to identify the text hidden in the signature and confirming that it is not a robot or any other system to protect the system from hacking. This would be really hard-to-read and thus ensures safety.

Antivirus software: This is a system to protect the system, when the virus tries to attack the system. An indication will be given through the software to the user.

4 0
3 years ago
Other questions:
  • The act of engaging in crime through the use of a computer or similar type of device is called:
    8·1 answer
  • Which two statements about using leased lines for your wan infrastructure are true? (?
    14·1 answer
  • Which step can most directly help your team follow up on decisions made during Web development meetings?This task contains the r
    6·1 answer
  • Which of the following is a full selector?
    12·1 answer
  • Review the given requirements using the checklist and discover possible problems with them. The following requirements are for a
    8·1 answer
  • Is it better to meet online or offline<br> (Please answer QUICK)<br><br> Thanks :')
    5·2 answers
  • What do modern CPUs use to simulate the performance of multiple processors within one processor?
    9·2 answers
  • 5. An entrepreneur who continues to find new and better ways of doing things is ____.
    10·1 answer
  • Ask the user to input a word. Then, print the first letter, the last letter, and the length of the word on the same line with no
    6·1 answer
  • What was revolutionary about Web 2.0?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!