1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Strike441 [17]
4 years ago
15

Compared to a virtual image, a real image

Computers and Technology
2 answers:
olganol [36]4 years ago
7 0

Answer: The answer is D: can be viewed on a screen.

Compared to a virtual image, a real image can be viewed on a screen.

Explanation:

A real image refers to an image that is formed when there is a meeting point between rays of light coming from an object after reflection. An example is the image seen on the cinema screen.

A virtual image refers to an image that is formed when there is no actual meeting point between rays of light coming from an object but they appear to meet when produced backwards. An example is the image seen in the mirror when standing in front of the mirror.

Musya8 [376]4 years ago
6 0
D.  can be viewed on a screen

100% sure

hope it helps!
You might be interested in
The count formula will tell you how many cells have a number in them, NOT the total number of cells with any value in them. True
Talja [164]

Answer:

false

Explanation:

hope it helps :)

4 0
3 years ago
You work as a Network Administrator for wwwpany Inc. You have suspected a bad driver or perhaps malware. Which of the following
vichka [17]

Answer:

Explanation:

There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.

This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.

En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.

8 0
3 years ago
Data owners ensure that only the access that is needed to perform day-to-day operations is granted and that duties are separated
Akimi4 [234]

Answer:

True

Explanation:

As employees might be accessing business/client data, security of data access is a topmost priority.

8 0
3 years ago
In Task 2, you worked with Sleuth Kit and Autopsy which rely on the Linux Web service called __________.
defon

Answer: Apache

Explanation:

You restarted Apache system in the cmd in the kali linux vm.

8 0
2 years ago
You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workst
Westkost [7]

Answer:

The ping command.

Explanation:

In a network, workstations known as clients, users or nodes are the devices where data is needed or sents from. A server on the other hand, is a device in the network, configured to render a particular service like database, domain name service, web service etc.

When a link from a workstation to a server is down, the workstation looses connection the server. To confirm the connectivity of the link, "ping" the server ip address from the workstation using the command "ping 'server ip address'". This sends echo packets to the server, which is echoed back if there is connectivity.

6 0
3 years ago
Other questions:
  • Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a se
    7·2 answers
  • What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
    9·1 answer
  • A method that receives a two-dimensional array uses two ____ pairs following the data type in the parameter list of the method h
    11·1 answer
  • What does it mean to read visual and audio text
    7·1 answer
  • Suppose that a system uses 32-bit memory words and its memory is built from 16 1M × 16 RAM chips. How large, in words, is the me
    11·1 answer
  • When light does not pass through or bounce off an object, it is said to be
    13·2 answers
  • What are these receivers called?
    10·1 answer
  • Source ________ contains instructions written by a programmer specifying the actions to be performed by computer software.
    15·1 answer
  • MODERATOR DELETE MY ACC
    8·2 answers
  • The information of an management information system comes from?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!