1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
4 years ago
10

Characters used to control the position of the output on the screen or paper, to cause some action to occur, such as ringing a b

ell or deleting a character, or to communicate status between the computer and an I/O device are called________
Computers and Technology
1 answer:
Sedbober [7]4 years ago
5 0

Answer:

There are four options for this question, and the letter C is correct:

a) glyphs.

b) symbols.

c) control characters.

d) command characters.

Explanation:

Control characters is a code with a number a several characters, Procedural signs in Morse code are a form of control character, a form of control was introduced in 1870 called Baudot code: NUL and DEL, and was introduced in 1901 Murray code added the carriage return (CR) and line feed (LF).

For example:

(null, NUL, \0, ^@) used by many programming language like "C".

You might be interested in
Technically
Sedaia [141]

The answer should be True


7 0
3 years ago
Is spread spectrum transmission done for security reasons in commercial WLANs?
bearhunter [10]

Answer: No

Explanation: Spread spectrum transmission is the wireless transmission technique for the wide channel that helps in decrement of the potential interference.The transmission of signal is based on the varying the frequency knowingly to achieve larger bandwidth.

The use of spread spectrum transmission in the WLAN(wireless local area network)is used for the regulatory purpose The regulation is the controlling of the area  through policies.Thus,security is not the service that is provided to WLAN by spread spectrum transmission.

6 0
3 years ago
Which Internet connection type tends to use shared bandwidth?<br> Cable<br> Dial-up<br> DSL<br> ISDN
zmey [24]

Answer:

try dial-up

Explanation:

3 0
3 years ago
Read 2 more answers
Cisco has created a proprietary layer 2 protocol used to manage VLAN configuration between switches called:________a. VLAN Confi
Reil [10]

Answer:

The correct answer is letter "E": None of the above.

Explanation:

The VLAN Trunking Protocol (<em>VTP</em>) provides an easy way of keeping an accurate VLAN configuration through a commuted network. The VTP allows solutions of commuted network easily scalable to other dimensions, reducing the need of manually setting up the red. The VTP composed of a layer 2 protocol used to manage VLAN setups between switches.

7 0
3 years ago
Which statement describes what the Conditional Formatting option in Excel 2016 allows users to do?
jeyben [28]

Answer:

It automatically applies formatting based on specific rules or conditions being met. It automatically applies highlighting to selected cell ranges based on specific rules or conditions being met.

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Chris needs to modify the default bullets that are used in a nonnumbered list in word. Which method should he use?
    9·2 answers
  • You are in charge of designing a menu tree for navigating 1,250 books in a digital library. Present an argument of whether the m
    12·1 answer
  • To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
    11·1 answer
  • what is it called when you are biying and selling products via electronic channels such as the internet​
    13·2 answers
  • What is used for World Wide Web?
    7·1 answer
  • Access Control can be defined as putting controls (or countermeasures) in place to help achieve information security goals. Whic
    13·2 answers
  • A single-user database system automatically ensures ____ of the database, because only one transaction is executed at a time.
    13·1 answer
  • Given an array of integers and the size of the array, write a function findDuplicate which prints the duplicate element from the
    11·1 answer
  • Taking a group of recipes and identifying the similarities is an example of _____.
    13·1 answer
  • Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!