1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pickupchik [31]
3 years ago
7

(01.05 LC)

Computers and Technology
2 answers:
liq [111]3 years ago
8 0
Their answer is known as an input, because they are saying what they know/think. Sorry if this didnt help have a nice day though^^
andriy [413]3 years ago
7 0
The answer is input! because the input is what the user enters, the output is what comes out from that, and the text and value aren’t related to the user
You might be interested in
Under what circumstances does a multithreaded solution using multiple kernel threads provide better performance than a single-th
pshichka [43]

The best scenario is when a program suffers from frequent page faults. In the situations when a kernel thread experiences a page fault, another kernel thread can be switched in; something a single-threaded process will not be capable of doing. Another best circumstance is when a program has to wait for other systems events.






5 0
3 years ago
Which option ensures that different parts of the document can have different page layouts? ​
Mice21 [21]

Answer:

77777777777777777

Explanation:

8 0
3 years ago
Read 2 more answers
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
3 years ago
One of the ways attackers can access unencrypted data being transmitted on your network is by
nikdorinn [45]
<span>One of the ways attackers can access unencrypted data being transmitted on your network is by </span>collecting electronic emissions that come from your networking closet or Ethernet cables. 
5 0
3 years ago
A token is a special control frame that indicates to the rest of the network that a particular node has the right to transmit da
rusak2 [61]
It is true that a<span> token is a special control frame that indicates to the rest of the network that a particular node has the right to transmit data.</span>
4 0
3 years ago
Other questions:
  • Many of today’s digital devices operate on battery power supplied by what kind of ion batteries.
    15·1 answer
  • What are barcode and rfid tags ​
    11·2 answers
  • Ng/ Computer Applications - Office 2016 - EL3520 A
    13·1 answer
  • How many people employed in the United States work in a job related to digital media?
    12·1 answer
  • The first step to changing lanes is
    8·2 answers
  • doubleIt is a function that takes one argument and returns no value . The argument is a pointer to int . The function doubles th
    9·1 answer
  • There are many modes of remote visual communication. which is the most common mode
    5·1 answer
  • A sensitive manufacturing facility has recently noticed an abnormal number of assembly-line robot failures. Upon intensive inves
    10·1 answer
  • Sistem komponen mekanikal yang terdapat pada sebuah basikal?​
    13·1 answer
  • Quick question if anyone knows? How do you give brainlist? Please tell me if you know! ( Here if a chiaki gif for your too lol )
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!