1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
4 years ago
13

On his computer desktop, Rodney can see several different files, each immediately accessible. Because he is actively working on

them and can open them whenever he wants, these files are in fact very similar to the kind of information held in _____ memory.
Computers and Technology
1 answer:
enyata [817]4 years ago
5 0

Answer:

System

Explanation:

You might be interested in
Alicia spends all day at work on the Internet and then all night on social networking sites looking at the many interesting thin
Stels [109]

Answer:

Better regulate time spent on internet

Explanation:

Because of the time Alicia is spending on the internet, seeing interesting things that her friends are doing, and perhaps her life has been boring, this tend to play with her psychology and she will begin to become depressed and start disliking her life. In this case, the main mediator is the internet, and the best way she can deal with depression at this level is to reduce or regulate the amount of time that she spends on the internet.

4 0
3 years ago
Why does my internet keep disconnecting and reconnecting.
3241004551 [841]

Answer:

Hmm maybe because its failing?

Explanation:

i actually dont know but it happens to me sometimes

6 0
2 years ago
Which of the following statements about ip addresses is true?
Greeley [361]

This question is incomplete because it is lacking the necessary answer options, which I have provided below:

A. When data is sent between devices on the Internet, they identify each other with an IP address.

B. When a user signs up for an email address they must also sign up for an IP address.

C. IP addresses are assigned at the factory.

D. The IPV4 IP scheme allows for an unlimited number of devices to connect to the Internet.

So, given your question, the answer option which is true about IP addresses is: A. When data is sent between devices on the Internet, they identify each other with an IP address.

An IP address is an abbreviation for Internet protocol address and it can be defined as a unique number assigned to a computing device or other network devices, in order to differentiate each computing device from one another in an active network system.

Hence, an IP address is typically designed and developed to uniquely identify each computing device or network devices connected to the Internet or an active network system.

Basically, IP addresses are used anytime two or more computing devices send and receive data from one another over the Internet.

In conclusion, interconnected computing devices identify each other with an IP address when sending and receiving data over the Internet.

Read more: brainly.com/question/20629962

5 0
3 years ago
April's manager has asked her to provide the financial service manager with the accounts that have not received payment. What sh
Irina-Kira [14]
C should be the answer to this I hope that this helps
4 0
4 years ago
Read 2 more answers
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
Other questions:
  • What is c also write it's features
    15·2 answers
  • As long as users refer to files in the ____ directory, they can access the files without entering the absolute filename.
    10·1 answer
  • When making an on-site service call, what should you do before making any changes to software or before taking the case cover of
    6·1 answer
  • Is the ability to use digital tools for reading communicating and learning online?​
    5·1 answer
  • In most cases, it is possible to prevent an exception from terminating a program by using the try and except statements. Select
    13·1 answer
  • 1
    15·1 answer
  • Do not use the scanner class or any other user input request. You application should be self-contained and run without user inpu
    5·1 answer
  • Is this statement true or false?
    5·1 answer
  • How do I install another part on campaign call of duty cold war? please help.(best answer will get branliest.)
    15·2 answers
  • What is a graphics card?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!