1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
3 years ago
14

Without a/an ________. a computer is useless

Computers and Technology
1 answer:
Len [333]3 years ago
3 0
Without a/an Operating system. a computer is useless
You might be interested in
Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB
ahrayia [7]

<u>The total size of backups:</u>

The source data is 50 GB. When its full backup is created, it takes 50 GB of space. Now, next week when 10 more GB of data has been added, the total source data are 60 GB. On creating another full backup, the size comes  out to be 60 GB as well and cumulative backup is 50 GB + 60 GB which equates to 110 GB.

In the second week, another 30 GB has been added to the source data, and on full backup creation, the size will be 60 GB + 30 GB which equates to 90 GB. So, the total size of backups saved till date will be 110 GB + 90 GB which equates to 200 GB.

7 0
3 years ago
State three advantages of using a printer​
Vera_Pavlovna [14]

Answer:

Advantage: Convenience. One of the key advantages of printing out material is that it is convenient.

Advantage: Secure Delivery. Paper records can be anonymously delivered

Advantage: Ease of Reading

I hope It helps

7 0
3 years ago
Please help me I don’t know what to do
kiruha [24]

Answer:

B

Explanation:

4 0
3 years ago
Read 2 more answers
________ was one of the first uses of the Internet
NeTakaya

Government weapon in cold war

3 0
3 years ago
Read 2 more answers
In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow
Sphinxa [80]

Answer:

enable the used ports in the router with their respective IP address and only the connected ports in the switch. Allow configure the STP on the switch

Explanation:

Network switches are used to connect a group of computer devices in a network LAN. It is automatically enabled when a port is connected and creates a MAC address table of the computers connected to it. STP or spanning-tree protocol is a protocol used to prevent looping in a switch. Unused ports can be disabled for security reasons.

A router is a network device that is used to forward packets between networks. All used ports in a router must be enabled and configured with an IP address and subnet mask.

5 0
3 years ago
Other questions:
  • The following program includes fictional sets of the top 10 male and female baby names for the current year. Write a program tha
    15·1 answer
  • If you press the key corresponding to letter A on the keyboard, what process is carried out inside the CPU to display the letter
    10·1 answer
  • Which table attributes would this code produce?
    15·1 answer
  • The engineering firm you work for is submitting a proposal to create an amphitheater at a state park. Proposals must be submitte
    15·1 answer
  • How does the Problem-solving Process help us to solve everyday Problems?
    13·1 answer
  • In a network, multiple critical paths can occur. true or false
    13·2 answers
  • Class C Airspace inner ring begins at the __________ and extends vertically (by definition) to MSL charted values that generally
    5·1 answer
  • "Rights and duties are two sides of the same coin." Explain with examples​
    5·1 answer
  • Does anyone have discord
    14·2 answers
  • How am i able to hear a presenter from a radio station through my fm tuner​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!