1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
4 years ago
8

Edhesive silly questionsj

Computers and Technology
1 answer:
Alex17521 [72]4 years ago
4 0
Mnhhbjhhhhdndkdjdjddnnxnx
You might be interested in
What are multiple worksheets
Naddika [18.5K]
More than one worksheet?
5 0
3 years ago
Encapsulation is the process of “packaging” information prior to transmitting it from one location to another. true or false
GenaCL600 [577]

The statement that encapsulation is the process of “packaging” information prior to transmitting it from one location to another is true.

This method augments the data with successive layers of control information before transmission across a network. Each OSI (Open System Interconnection) layer  is part of the encapsulation by adding a header to the data packet in the transmission network.

3 0
3 years ago
While working alone at their respective constant rates, computer X processes 240 files in 4 hours and computer Y processes 240 f
RSB [31]

Answer:

8/3 hours

Explanation:

For this question, let us say that 1 job contains 240 files

Computer X does this job in 4 hours

Computer Y does the same job in 8 hours

All we need to find is how long it will take both computers to finish the job

Now we apply the basic combined work formula, which is

Combined Time = (time a * time b)/(time a + time b)

And we known that time a = 4 hrs,

We then substitute this values into the equation to get

Combined time = (4*8)/(4+8)

= 32/12

= 8/3 hours

6 0
3 years ago
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
Which of the following are peripheral devices?
Fittoniya [83]

Explanation:

I think it's speakers,

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which method deletes a footer from a document?
    9·2 answers
  • List of most popular entertainment and culture websites
    15·1 answer
  • . Why should we favor programming to interfaces over implementations?
    6·1 answer
  • What is the keyboard shortcut used to paste previously copied text?
    15·2 answers
  • Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
    8·1 answer
  • What are Important points to include about preventing the download of malware?
    14·1 answer
  • Read the scenario and then answer the question using only the information provided.
    7·1 answer
  • You are an IT network administrator at XYZ Limited. Your company has critical applications running of its Ubuntu Linux server. C
    6·1 answer
  • Is this even possible
    9·2 answers
  • Help PLEASE ILL MARK as brainlest
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!