1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
11

What is a Network It’s a system that is used to link two or more computers and name the different types of networks.?

Computers and Technology
1 answer:
mariarad [96]3 years ago
5 0
Yes, that's correct. a network is where you connect two+ computers together.
You might be interested in
Design an algorithm for a bounded-buffer monitor in which the buffers (portions) are embedded within the monitor itself."
sattari [20]

Answer:

Required code is given below:

Explanation:

monitor bounded buffer {

int items[MAX ITEMS];

int numItems = 0;

condition full, empty;

void produce(int v)

{

while (numItems == MAX ITEMS) full.wait();

items[numItems++] = v;

empty.signal();

}

int consume()

{

int retVal;

while (numItems == 0) empty.wait();

retVal = items[--numItems];

full.signal();

return retVal;

}

}

5 0
3 years ago
____________ is a widely accepted international best practices framework for implementing information systems security.
balandron [24]

Answer:

Control Objectives for Information and related Technology (COBIT)

Explanation:

COBIT is a framework developed by the ISACA for managing and supervising Information Technology processes. Such kinds of frameworks allow companies to position themselves with the expectations that they and their clients expect. COBIT's aim is to provide management and business process owners with an IT control and governance model that helps deliver value from IT and identify and handle the IT-related risks. It helps bridge the gap between business needs, control requirements and technical issues. It is a paradigm of control for addressing the IT governance requirements and maintaining the security of knowledge and information systems. COBIT emphasizes on what allows processes to work well.

8 0
3 years ago
Pls help! for computers edge 2021
KATRIN_1 [288]
I believe it is the first one, i did some research for this question
7 0
3 years ago
Question 1 of 10
ycow [4]

Answer:

Explanation:

Def f

4 0
3 years ago
Where in an email would u find information about the action requirements​
Assoli18 [71]

Answer:When trying to find the action that you need to do in an e-mail, it is best to consult the body of the email, also known as (B) in the message.. The message would detail the tasks that you need to tackle, which are generally not detailed in the subject line, greeting, and you will most definitely not find in the to field.

Explanation:

3 0
3 years ago
Other questions:
  • Describe three main types of testing and the order in which they are performed.
    9·2 answers
  • https://brainly.com/app/ask?entry=top&q=What+did+you+learn+during+this+course+that+reinforces+your+belief+in+your+technology
    5·1 answer
  • Which technique helps you look confident as a speaker?
    15·1 answer
  • A form letter can be customized by using different fields in a __________.
    15·2 answers
  • If a triathlon is a sport combining three events, what do you think would be the word for a sport combining five events?
    7·1 answer
  • Please help! I tried this by myself. But I am not sure if this is right.
    8·2 answers
  • A chemical mixture that is burned to produce thrust. (Jet engine homework)
    14·2 answers
  • Old systems can be useful when designing new computer software.<br> True or False
    7·2 answers
  • CSCU EXAM TEST FINAL1-A software or hardware that checks information coming from the Internet and depending on the applied confi
    6·1 answer
  • What is a disadvantage of communicating on social media?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!