1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedaia [141]
3 years ago
7

#5 Multiple Select Which of the following describes a hardware error? Select 3 options.

Computers and Technology
2 answers:
harkovskaia [24]3 years ago
8 0

Answer:

B,C,D

Explanation:

DENIUS [597]3 years ago
7 0

Answer:

A, E

Explanation:

Hope this is correct

You might be interested in
Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
lutik1710 [3]
 "Hackers" who work for companies to expose security flaws are definitely good, they're helping protect systems, often referred to as "white-hat" hackers. Many companies hire people like these or offer bounties for such people who can find vulnerabilities. One could say that even without permission, people who hack with the intent of demonstrating holes in security or improving a service could be considered good.

However, I don't believe that as firstly, they are breaking the law, and secondly, they are stealing data and invading people's privacy. One might as well break into somebody's house to say their security is bad! 


7 0
3 years ago
C++Assign to maxSum the max of (numA, numB) PLUS the max of (numY, numZ). Use just one statement. Hint: Call FindMax() twice in
neonofarm [45]

Answer:

Replace the comment with:

maxSum =FindMax(numA,numB)+FindMax(numY,numZ);

Explanation:

Required

The statement to add up the two maximum from the functions

To do this, we have to call FindMax for both arguments i.e.

FindMax(numA,numB) and FindMax(numY,numZ) respectively

Next, use the + sign to add up the returned value.

So, the complete statement is:

maxSum =FindMax(numA,numB)+FindMax(numY,numZ);

<em>See attachment for complete program</em>

6 0
3 years ago
Using both a firewall and host hardening to protect a host is ________.
sergiy2304 [10]
I would think layered security or defense in depth
6 0
4 years ago
An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the comp
ozzi

Answer:

Redundant networks are generally more reliable.

Explanation:

6 0
3 years ago
What can help prevent issues related to downloading content from the internet
Natasha_Volkova [10]
The best step to take is to have some kind of anti-malware/spyware software. Hope this helps you!


-Belle
8 0
3 years ago
Other questions:
  • 2a
    8·1 answer
  • In fixed-width files, each record is on a separate line and the fields are separated by a special character.
    7·1 answer
  • Which would increase electric current? increasing the resistance increasing the size of the wire decreasing the voltage
    6·1 answer
  • Write a method drivingCost() with input parameters drivenMiles, milesPerGallon, and dollarsPerGallon, that returns the dollar co
    12·1 answer
  • How can I, fill the application form for jobs. [such as Macdonal's jobs].?
    12·1 answer
  • Use the drop-down menus to complete the steps for rearranging the layout of a form.
    15·1 answer
  • A folder is a collection of related of data is true or false​
    10·2 answers
  • PROCEDURE: Therapeutic infusion of saline solution with 5% dextrose IV, 500 ml for dehydration, lasting 48 minutes. what is the
    13·1 answer
  • In the software development process, which review studies the software design before it is released for coding?
    7·1 answer
  • declaring a member as in the base class provides access to that member in the derived classes but not to anyone else.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!