1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
4 years ago
9

Similarites between hardware and software

Computers and Technology
1 answer:
Mila [183]4 years ago
4 0
Computer hardware is any physical device used in or with your machine, whereas software is a collection of code installed onto your computer's hard drive. For example, the computer monitor you are using to read this text and the mouse you are using to navigate this web page are computer hardware.
You might be interested in
What is a saved link to a particular web page?​
il63 [147K]

Answer:

In a website, a hyperlink (or link) is an item like a word or button that points to another location. When you click on a link, the link will take you to the target of the link, which may be a webpage, document or other online content. Websites use hyperlinks as a way to navigate online content.

4 0
3 years ago
While troubleshooting an Internet connection problem for your network, you restarted the modem and then the router. The router i
grandymaker [24]

Answer:

d. ipconfig /release

b. ipconfig /renew

a. ping

c. nslookup microsoft.com

Explanation:

A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

Basically, it is an electrical device or node that is designed to connect two (2) different networks (in different locations) together and allows them to communicate.

Generally, routers are configured using a standard routing protocol with an IP address as the default gateway.

Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.

Basically, a DHCP server is designed to automatically assign internet protocol (IP) address to network devices connected to its network using a preconfigured DHCP pool and port number 67.

On a related note, when a computer that is configured with DHCP cannot communicate or obtain an IP address from the DHCP server, the Windows operating system (OS) of the computer automatically assigns an IP address of 169.254.33.16, which typically limits the computer to only communicate within its network.

I. ipconfig /release

II.. ipconfig /renew

III. ping

IV. nslookup microsoft.com

7 0
3 years ago
Code for the alert box is
Georgia [21]

Answer:

(a) alert("Some text");

Explanation:

When coding in Javascript the correct code for creating an alert box is

alert("Some text");

This will generate an alert box at the top center of the user's screen that has the text which you have written inside the quotation marks. This is the simplified version of the original code which is also what is more commonly used. The original code would be

window.alert("Some text");

4 0
3 years ago
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
If you did not want a header on the first page of your document, you would need to select the _____ feature from the Options men
Viktor [21]

Answer: insert header

5 0
3 years ago
Other questions:
  • Discuss two advantages and two disadvantages of agile methods
    9·1 answer
  • The ________ phase is a technical blueprint for a whole system which captures all aspects of how the system's components will fu
    9·1 answer
  • When classified data is sent over an unclassified network, what is this incident called?
    5·1 answer
  • Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can
    14·1 answer
  • Python
    6·1 answer
  • Giving brainliest if you answer question.
    8·1 answer
  • Write a python program that will accept monthly salary amounts greater than zero but less
    12·1 answer
  • The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.
    12·1 answer
  • Write a Java expression that converts the value of 'y' into an integer, and assigns the value to 'x'.
    15·1 answer
  • if we intend to include a servo motor as an actuator, what feature should we include when selecting a microcontroller?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!