1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
3 years ago
12

what is hyperlink a)the text contained in hypertext documents b)a service provided by the internet c) the location of web pge on

the internet d)a reference to information on a different web page
Computers and Technology
1 answer:
Annette [7]3 years ago
6 0
The answer is A) hope that this will help you
You might be interested in
Expalin the defference between the driver of a desktop and a laptop​
Pani-rosa [81]

Answer:

None, drivers are hardware specific, if both devices share the same hadware manufacurer they tend to have the same drivers.

A driver is a software component that lets the operating system and a device communicate with each other. So asking for a difference in drivers is as asking the difference in hardware in both devices, though one tends to be more intergrated they are all the same in low level functions

Also drivers might not even communicate directly with the device but send a request. thats why some drivers can be written directly into an operating system.

7 0
3 years ago
The need to upgrade which component would likely lead to replacing the computer?
Alex787 [66]

Answer:

CPU

Explanation:

The CPU is essentially the brain of a CAD system soooo

6 0
3 years ago
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
2 years ago
Read 2 more answers
What is the pencil tool in photoshop
Mrrafil [7]

Answer:

I think its to draw on the photo.

Explanation:

6 0
3 years ago
Read 2 more answers
Match each word to its correct meaning.
Juli2301 [7.4K]

Answer:

1. Computer Network - a group of computers that are  Interconnected in order to share  Information or documents  the component in the body of the  computer that stores all of your files and  folders

2. CPU - the central processing unit or part  Inside the body of the computer that  enables the computer to function, sometimes referred to as the brain of the  computer

3. Hard Drive - The componet in the body of the computer that stores all of your files and folders

4. Hardware - Physical parts of the computer or technical equipment

5. Internet - Interconnected computer networks throughout the world that everyone can use

6. Laptop - A small mobile computer

7. Motherboard - The main board in the body of the computer that contains chips and other compnents

8. Software - A computer program or a set of instructions for the hardware to perform

8 0
3 years ago
Other questions:
  • Part 2: students and courses, part 1  java review you may use an ide or a text editor, but i will test this by compiling and ru
    6·1 answer
  • It is essential that a security professional is able to resolve and respond to cyber law inquiries and incidents while avoiding
    14·1 answer
  • The average and distribution of properties, like orientation or color, over a set of objects or a region in a scene are called t
    12·1 answer
  • What is responsible for coordinating a computer's hardware and software components?
    13·1 answer
  • Visme,PowerPoint, keynote and prezi are what kind of software
    15·1 answer
  • (I WILL GIVE BRAINLIEST) Which steps will delete an appointment?
    8·1 answer
  • In QBasic, create a number guessing challenge. Your program should generate a random number from 1-
    9·1 answer
  • Compare and contrast the various write strategy used in cache technologies<br>​
    13·1 answer
  • Which directory stores the cron configuration file?.
    8·1 answer
  • Which hardware component interprets and carries out the instructions contained in the software.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!