1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vfiekz [6]
3 years ago
14

__________ consists of both physical devices and software, links the various pieces of hardware, and transfers data from one phy

sical location to another.
Computers and Technology
1 answer:
sineoko [7]3 years ago
6 0

Answer:

Communications technology

Explanation:

<u>Communications technology</u> consists of both physical devices and software, links the various pieces of hardware, and transfers data from one physical location to another.

You might be interested in
(1) Prompt the user to enter four numbers, each corresponding to a person's weight in pounds. Store all weights in a list. Outpu
Alexeev081 [22]
No one is going to do this
4 0
3 years ago
What information will you find in the 16-bit field in an IP datagram?
faust18 [17]

Answer: This 16-bit field defines the entire packet size in bytes, including header and data. The minimum size is 20 bytes (header without data) and the maximum is 65,535 bytes. All hosts are required to be able to reassemble datagrams of size up to 576 bytes, but most modern hosts handle much larger packets.

Explanation: Hopefully this helps you with what ever u are doing.

7 0
3 years ago
What is the maximum number of different codes that can be represented in 2 bytes?
olganol [36]
A two byte word has 16 bits, so there are 2^16 possible values.
5 0
3 years ago
What command is used to generate an RSA key pair?
Leokris [45]

Answer:

D) crypto key generate rsa

Explanation:

In cryptography, the RSA refers to Rivest–Shamir–Adleman. This is an algorithm used for encrypting and decrypting messages in computers thereby ensuring secured transmission of data. In order to generate an RSA key pair, you will use the command crypto key generate rsa while in the global configuration mode. This command has the following syntax:

crypto key generate rsa [general-keys| usage-keys| signature| encryption] [<em>labelkey-label</em>] [exportable] [modulus <em>modulus-size</em>] [storage <em>name of device</em>:][redundancy][on <em>name of device</em>:],

with each parameter having its description

5 0
3 years ago
What technology process would help you access files at all times?
sveta [45]

Answer:

F and H

Explanation:

Cloud stores and saves all your information and a hard drive you can carry around

If anyone who knows more about this can correct me or say that im correct that would be of much help.

8 0
4 years ago
Other questions:
  • The problem solving process begins by first ______ the problem.
    11·1 answer
  • What executable programs have names that are just one character long, and what do they do??
    5·1 answer
  • Ok so sometimes when i do something i see a box with a question mark in it, how do i remove it, i am on a macOs High Sierra earl
    11·1 answer
  • Which term refers to a fact that naturally occurs in the universe?
    8·2 answers
  • A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
    10·1 answer
  • You Could Never Size Me UP! Been Doing This Sh*t A Long ⏱time
    15·1 answer
  • Write a function writel that will write the length of a side of a square. If only one argument is passed to the function, it is
    10·1 answer
  • Can you please help me?
    6·1 answer
  • Put Your Zom Here If You In Zom
    6·2 answers
  • Which of the following represents a backup system that will aid in recovery for any type of disaster or disruption?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!