1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
2 years ago
13

A cable that connects the computer to the printer is an example of A.hardware B.software

Computers and Technology
2 answers:
Vitek1552 [10]2 years ago
5 0
The answer is A. Hardware
Vlad1618 [11]2 years ago
4 0
I think it hardware A.
You might be interested in
You want to connect to a user desktop to review windows 10 configuration settings when the user is not present. which technology
MakcuM [25]

Remote desktop is a technology that allows users to connect to a specific computer from a remote location as if they were sitting in front of it.

<h3>What is the desktop remote system?</h3>

A remote desktop is a program or an operating system feature that permits a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.

<h3>What is Remote Desktop example?</h3>

A basic example of a Remote Desktop is securing your home laptop to your office PC so you can access files, run applications, print documents, etc. on that PC without going into the office.

However, the host machine does not have to be a PC. It is often a waitperson or virtual server environment in many business use cases.

To learn more about  remote desktop, refer

brainly.com/question/4455143

#SPJ4

3 0
1 year ago
Write a program that displays in the title of the window the position of the mouse as the user moves the mouse around the window
12345 [234]
The java program displays these 
4 0
3 years ago
Default tab stops are set in word every _______ inch. a. ¾ b. ½ c. 1 d. ¼
Dennis_Churaev [7]
A) 3/4 inch Meow! XD
6 0
3 years ago
What are the main features cyber law of Nepal​
muminat

Answer:

What are the provisions of cyber law in Nepal?

Provision of cyber law of NEPAL

It provides legal status to digital signatures and electronic records which in turn are used in electronic banking, shopping and commerce. It provides laws for formation of judicial system that operates only for crimes related to computer (internet and cyber space).

Hope this helps Have a good day

6 0
2 years ago
What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number o
marishachu [46]

The subnet mask can be utilized to segment the 172.16.0.0 network to qualify for a minimum of 6 subnets while maximizing the numeral of broadcasters per subnet is 255.255.224.0

<h3>What do subnet masks mean?</h3>
  • A subnet mask is a 32-bit numeral formed by setting keeper bits to all 0s and developing network times to all 1s.
  • In this way, the subnet mask divides the IP speech into the network and host addresses.
  • A subnet mask is used to separate an IP address into two pieces. One element defines the host (computer), and the different part identifies the network to which it belongs.
  • To better comprehend how IP lessons and subnet masks work, look at an IP speech and see how it's managed.

To learn more about  subnet mask, refer to:

brainly.com/question/3234986

#SPJ4

5 0
1 year ago
Other questions:
  • Don is the superintendent of the county school system. What task might Don
    8·1 answer
  • In a social networking site your personal information is listed under your inbox. home. status. profile.
    11·1 answer
  • What is the IEEE standard for the Wi-Fi Protected Access 2 (WPA2) security protocol?
    6·1 answer
  • Which of the following typically have the highest auto insurance premiums?
    14·1 answer
  • PLEASE  HELPPPP!!!!!
    14·1 answer
  • Using PowerPoint or Impressed guarantees that your presentation will do which of the following?
    6·1 answer
  • Enum Digits {0, 1};
    10·1 answer
  • What should be done if a system cannot boot from the hard drive?
    14·1 answer
  • Please help me in this question​
    7·2 answers
  • Mack signs into his laptop and gets a message saying all his files have been encrypted and will only be released if he sends mon
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!