1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Airida [17]
3 years ago
7

All of the following are examples of being computer literate, EXCEPT ________. Group of answer choices knowing how to build and

program computers knowing how to avoid hackers and viruses knowing how to maintain and troubleshoot your computer knowing how to use the web efficiently
Computers and Technology
1 answer:
-BARSIC- [3]3 years ago
5 0

Answer:

knowing how to build and program computers

Explanation:

A computer literate is one who has the basic skills and knowledge to use computers. Having the knowledge of how to evade hackers, maintain your computer and use the web efficiently are basic daily operations you will encounter when using your computer.

However, knowing how to build and program computers is a more advanced requirement for computer users and not a basic requirement. So to be a computer literate you just need to be able to do basic operations on your computer.

You might be interested in
Write one line Linux command that performs the required action in each of the problems given below: (a) Find the difference in t
Luda [366]
You have to add the integer
8 0
2 years ago
This information is stored in every IP packet to make sure that the packet is eventually discarded if it cannot find the address
Andreas93 [3]

Answer:

TTL

Explanation:

TTL means time -to- live field is a counter that is designed to keep packets from circulating indefinitely in the network case forwarding tables accidentally create cycles. An IP datagram is typically initialized with a TTL of 60 or 64 and the TTL is decremented by one each time it enters a router. If the TTL reaches zero, the router will discard the packet. It is one of the components of the IP datagram

6 0
3 years ago
you are installing two new hard drives into your network attached storage device your director asks that they be put into a raid
Genrish500 [490]

Question options:

a. RAID 0

b. RAID 1

c. RAID 5

d. RAID 6

e. RAID 10

Answer:

d. RAID 6

Explanation:

RAID is Redundant Array of Inexpensive/Independent Disks. RAID combines low cost physical hard disk drives in one hard disk drive. RAID is used to achieve data redundancy(data backup but with synchronization) or improved performance or both.

To get what the director requires he would need to use RAID 6. RAID 6 is RAID level optimized to achieve data redundancy but with slow performance.

7 0
2 years ago
Two electronics technicians are discussing electrical quantities. Technician A says that resistance is an opposition to electric
inessss [21]
Neither are correct.

Resistance is opposition to CURRENT not power.
Technition B Is wrong about the voltage thingy.
6 0
3 years ago
What is meant by key distribution center ( KDC)?
erastovalidia [21]

Answer: A. A method of access control that allows a user to log on to a system and gain access to other resources within the network via the initial logon

Explanation: key distribution center ( KDC) is a system that is used to provide access to a particular network user who shares data which are either private or regarded as sensitive.

It is a form of encryption that allows multiple system within the same network through the use of uniquely secured tickets used to setup a secure connection which gives room for data to be shared.

KDC makes use of cryptographic techniques to prove the validity of a user and grants a ticket permission access. The user present the ticket of permission to the system which then validates it and grant access to the user.

Example of security system that adopts KDC include kerberos.

4 0
3 years ago
Other questions:
  • Using Karnaugh maps, simplify the following Boolean function:
    14·1 answer
  • What is the definition of a server?
    11·1 answer
  • How do you insert a new row into a worksheet
    5·1 answer
  • Point out the correct statement.
    11·1 answer
  • 334. Universal Containers uses a custom field on the account object to capture the account credit status. The sales team wants t
    12·1 answer
  • You are network administrator for an Active Directory forest with a single domain. Then network has three sites with one domain
    12·1 answer
  • What is the purpose of a report?
    6·2 answers
  • 75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro
    13·1 answer
  • Find the double word-length 2's complement representation of each of the following decimal numbers:a. 3874
    12·1 answer
  • You've just finished installing a wireless access point for a client. What should you do to prevent unauthorized users from usin
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!