1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
3 years ago
12

Halp Computer Science

Computers and Technology
2 answers:
AleksandrR [38]3 years ago
8 0

1st one: is memory

2nd one: is 8

Tatiana [17]3 years ago
6 0
Question 11 is 8 and question 10 is mermory i think
You might be interested in
What are the uses of computer in educational setting?
Arada [10]

Answer:

Quick Communication & Correspondence

Explanation:

Another main advantage of using computers in the education field is the improvement in the quality of teaching-learning process and communication between students & teachers. For this, they use Microsoft PowerPoint to prepare electronic presentations about their lectures.

8 0
3 years ago
Read 2 more answers
Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c
TiliK225 [7]

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
4 0
3 years ago
How many broadcast domains are created when you segment a network with a 12-port switch?.
Elenna [48]

There is one broadcast domain created when you segment a network with a 12-port switch.  

<h3>What is a Broadcast domain?</h3>

A broadcast domain may be defined as a reasoning classification of a computer network that is significantly based on all nodes and can extend to each other by broadcast at the data link layer.

A network with a 12-port switch significantly creates 12 collision domains and 1 broadcast domain. This broadcast domain is large enough to perform specific functions within a network.

Therefore, there is one large broadcast domain created when you segment a network with a 12-port switch.  

To learn more about Broadcast domains, refer to the link:

brainly.com/question/14482282

#SPJ4

6 0
1 year ago
What programs provide email communication
Greeley [361]
One program would be Outlook. There is also Incredimail 
5 0
3 years ago
Read 2 more answers
Backup software creates backups and prevents you from losing all your data, so would backup software be considered an applicatio
GuDViN [60]

Answer: B

Explanation:

WHATS GOOD DAVE STRIDER? WHATS UP MAN I -  i man put the bunny back in the box what pumpkin apple juice?

ok so application software performs specific tasks for an end user and utility software just runs routine maintenance on your computer to ensure it runs smoothly. in this sense, the answer is B because if your computer crashed then you have no backup. things do not run smoothly obviously.

think of utility software as things such as antivirus, compression tools, defragmenter, and the other boring stuff that is meant for your computer to run smoothly

4 0
3 years ago
Other questions:
  • _____ refer(s) to computer programs that provide instructions for a computer to execute a desired task. Answer .a.Software .b. I
    7·1 answer
  • Unlike a virtual image, a real image
    7·1 answer
  • The measure of the maximum amount of data that can travel through a computer’s communications path in a given amount of time is
    9·1 answer
  • Write an application that asks a user to type an even number or the sentinel value 999 to stop. When the user types an even numb
    8·2 answers
  • In the layers toolbar, which layer will appear in front of your game
    9·1 answer
  • In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore dam
    5·1 answer
  • E-mail has made it very easy to send a message to more than one person at any time of day from just about anywhere. If you wante
    7·1 answer
  • Select the correct answer.<br> What do you understand by "exposition"?
    10·2 answers
  • Pie charts are best used for
    5·1 answer
  • The process of arranging the item of a column in some sequence or order is known as?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!