1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
4 years ago
9

All systems have ___________.

Computers and Technology
2 answers:
ehidna [41]4 years ago
6 0
They have output of feedback
enot [183]4 years ago
4 0

Answer:

C. Input, Process, and Output.

hope this helps you. ;)

You might be interested in
Several steps are involved in creating a presentation. What is the last step in the process before preparing to present it?
kupik [55]
The answer to this is B.
8 0
3 years ago
Read 2 more answers
You are asked to assume the role of an employee of the DigiFirm Investigation Company. As part of its community outreach effort,
kirill [66]

Answer:

1.  To trace an email we need to examine the header part of the email. By examine the header of an email we could extract the sender, subject and other important credentials related to that email.  

2. The command to trace the email id is “whois” command.

 First open the email client and find the IP address of the received email that need to be traced.  The command “whois” IP address gives the registration information of that IP address.

 3.  Reverse address/email search is the procedure used by the experts to find the origin or the ownership of the email.  Rather than tools websites are more use full in the reverse address search.

http://reverse.addresssearch.com, www.iplocation.net, etc. are good to find the ownership of an email.

4. We need to set up mail server to send, receive and to explore various activities associated with an email.  The other related purpose servers like SMTP server, HTTP server , etc are also required to assist large organizations.  The mail server can be a stand-alone computer or a collection of computer and servers.

 5.  The executable files should be examined thoroughly in the server, it can be dangerous malwares.  The examination is mainly done by scanning for malicious words and sender address.  Since many mail providers does not allow executable files to send, so the attackers are using other files also as a carrier of the malwares, so now every emails should be subject to deep examination using some malware scanner.  

6.   By the time of examination the some of the legitimate mails may also come under the suspect list so further check is needed there.  At the same time the attacks can be from legitimate sources also this could be go un-noticed; this should be also a challenge to face in the stage of e-mail examination.

8 0
3 years ago
When Alice turned on her laptop this morning, the screen displayed only colorful horizontal lines. Which of the following is mos
Scilla [17]

Based on the provided information, the screen displayed only colorful horizontal lines, what is  most likely to have a problem is the video card .

This is because the video card, contain graphics processing unit .

<h3>What Is a video card?</h3>

video card can be regarded the integrated circuit which generates the video signal sent to a computer display.

Learn more about video card, at;

brainly.com/question/7828376

5 0
3 years ago
I need to get 20 websites about Artificial Intelligence (not Wikipedia) for 20 annotated bibliographies.
adell [148]

Answer:

https://books.google.com/books?id=H39dDwAAQBAJ&pg=PA452&lpg=PA452&dq=20+websites+for+Artificial+Intelligence+for+annotated+bibliographies.&source=bl&ots=Pe9AafWxCM&sig=ACfU3U3B_5nwtNBg8l92tgZekJVmdvbYCA&hl=en&ppis=_e&sa=X&ved=2ahUKEwjW49PYgvznAhUMZd8KHZQHBZIQ6AEwAHoECAsQAQ#v=onepage&q=20%20websites%20for%20Artificial%20Intelligence%20for%20annotated%20bibliographies.&f=false

Explanation:

4 0
4 years ago
Which are generated by web server software, record a userâs actions on a web site?
Dominik [7]
The web server logs what files were served, to which address and when they were served. It also logs errors (in a separate file). The admin has to piece together the logs to follow a user's actions.
4 0
3 years ago
Other questions:
  • A friend knows I'm taking a technology class in college and asks me how a hard drive works. What should I say to a friend about
    10·1 answer
  • Emilio is reviewing the data he collected from historical records about immigration in the united states. He decides to create a
    5·1 answer
  • How many bits are reserved for the Transmission Control Protocol (TCP) flags?
    11·1 answer
  • What is the purpose of the operating systems management function
    5·1 answer
  • What are the disadvantages of using photo editing software in photography?
    14·1 answer
  • 15. The most efficient way to perform data entry is to keep your hands on the keyboard and press _______ to move to the next cel
    13·1 answer
  • Does anyone know about ICT? i need help ASAP
    9·1 answer
  • Question 21 pts How many lines should an email signature be? Group of answer choices "5 to 6" "7 to 8" "1 to 2" "3 to 4"
    10·1 answer
  • You defined a book data type.
    15·1 answer
  • Guys please tell me which cable is this?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!