1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
5

Which of the following is not hardware? wireless network router X-box 360 game controller virus scanner flat-panel monitor

Computers and Technology
2 answers:
MaRussiya [10]3 years ago
7 0
Virus Scanner, because you cannot physically touch a virus scanner.
Kipish [7]3 years ago
5 0
The virus scanner scanner is software rather than hardware because it is found as programming withing the computer

Hope this helps<span />
You might be interested in
The rules and guidelines for appropriate computer mediated communication are called?
irinina [24]
<span>The rules and guidelines for appropriate computer mediated communication are called netiquette. 
It is a blend of two words: net (from Internet) and etiquette, or the appropriate behavior. 
</span>
4 0
3 years ago
You recently set up a DHCP server and need to configure your computer to start using it. Click the IPv4 properties option that y
AURORKA [14]

Answer:

Dynamic IP address configuration.

Explanation:

In information technology, there are two ways of configuring IP address on a computer system, namely static and dynamic configuration.

In the computer system, the IP address is configured by selecting the static radio button and typing in the IP address, subnet mask and default IP address. The dynamic IP address configuration requires a selected radio button indicating DHCP configuration and a DHCP server.

The DHCP server holds a range of IP addresses that is used assign IP addresses automatically to a client system.

5 0
3 years ago
The creation of​ __________ with digital media allows for large quantities of numerical or textual data to be searched online by
ANEK [815]

Answer:

Option A- Reference materials

Explanation:

Reference Materials A digital reference library that provides more than 600 high-quality reference books from the world's leading publishers to be searched online by data points and trends

3 0
3 years ago
Read 2 more answers
Design a program using ordinary pipes in which one process sends a string message to a second process, and the second process re
Dmitry [639]

Here's a solution in C#. Create two console applications, one for the client and one for the server. In the server, put this:

           Console.WriteLine("Listening to pipe...");

           var server = new NamedPipeServerStream("BrainlyPipe");

           server.WaitForConnection();

           var reader = new StreamReader(server);

           var writer = new StreamWriter(server);

           while (true)

           {

               var line = reader.ReadLine();

               if (!server.IsConnected) break;

               Console.WriteLine("Received: " + line);

               writer.WriteLine(ChangeCase(line));

               writer.Flush();

           }

To change case, add this function:

       public static string ChangeCase( string s)

       {

           var sb = new StringBuilder();

           foreach(char c in s)

               sb.Append(char.IsUpper(c) ? char.ToLower(c) : char.ToUpper(c));

           return sb.ToString();

       }

In the client, put this:

           var client = new NamedPipeClientStream("BrainlyPipe");

           client.Connect();

           var reader = new StreamReader(client);

           var writer = new StreamWriter(client);

           writer.WriteLine("Brainly question 13806153 demo");

           writer.Flush();

           Console.WriteLine(reader.ReadLine());

           Console.ReadLine();


5 0
3 years ago
After the security breach at CardSystems Solutions, a security assessment of the security measures used at the company proved th
Verizon [17]

Answer:

Was not PCI DSS- compliant.

Explanation:

This is a payment Card industry data security standard which is an information security standard that deal with branded credit card.

8 0
3 years ago
Other questions:
  • Write a c++ function, largestnum, that takes as parameters a double array and its size and returns the index of the last occurre
    14·1 answer
  • Use induction on n to prove that fir all n&gt;=2, 2^n+3^n&lt;5^n
    11·1 answer
  • Select the statements that are true regarding the future of technology. Select 2 options.
    12·1 answer
  • Which of the following statements is true? Computer disks are volatile storage devices Volatile storage is lost when a computer
    12·2 answers
  • After you have created at least four slides, a scroll bar containing scroll arrows and scroll boxes will appear on the right edg
    9·1 answer
  • One of the most common uses of spreadsheet are
    8·1 answer
  • What is software and explain the five types of software
    5·2 answers
  • Need help ASAP <br><br> Thankss + BRAINLIST only for correct answers
    10·1 answer
  • Is orgenized maningful and useful data​
    15·1 answer
  • I need a solution for this problem asap.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!