1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elina [12.6K]
3 years ago
15

Actors,narratirs,and other people whi appear in video programs collectively called what?

Computers and Technology
1 answer:
Cloud [144]3 years ago
8 0
They are called entertainers as a collective.
You might be interested in
how can you turn on a light switch and it not work, without turning off the power to the whole house?
vitfil [10]

Answer:

Go to the beaker box and turn off the power to that one room. Duh

Explanation:

6 0
3 years ago
A web designer calls to report that the web server web-s1.cisco is not reachable through a web browser. The technician uses comm
Sergeeva-Olga [200]

Answer:

He can determine if the network is operational with a ping to the IP address.

If this fails, it means this is a DNS issue.

He can also determine if a router is down between the source and the server

Explanation:

A successful ping to IP address indicates that the network is working and the web server is online. Failure means that the host cannot resolve the associated domain name.

Try the web server at 192.168.0.10 is reachable from the source host. A router is down between the source host and the server web-s1.cisco.com. There is a problem with the web server software on web-s1.cisco.com

6 0
3 years ago
In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial insti
elixir [45]

In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial institutions are known as <u>d. cyber terrorists</u>.

<u>Explanation</u>:

Cyber crime means crime committed with the help of computer and internet. Cyber terrorism means crime that causes damage to infrastructure components of financial institutions and government office and causes threat to the society.

Cyber terrorists are person who involve in cyber terrorism. The systems used in the governments and financial institutions should be protected with hardware and software to avoid cyber terrorism.

This kind of cyber terrorism is very dangerous, as they hack the system and destroy the valuable information stored in it.

5 0
3 years ago
Terrence smiles at his customers, helps his cowokers,and stays late when needed. What personal skill does Terrence demonstrate
adell [148]

Answer: Humility,kindness

Explanation:

5 0
3 years ago
Read 2 more answers
Which of the followings is design tool?[2 marks]
aalyn [17]

Answer:

Data Flow Diagram

Explanation:

Data flow diagram is representation of data which is processed in terms of input and output.It is a tool for designing the structure for a software.Rectangles,square and circles are used in representing the flow of information.

DFD consists two components

  • Layers-It consist many layers,the top layer is called context diagram.
  • Levels-The first level shows the main process of the system.
6 0
3 years ago
Other questions:
  • The default primary key for an access database is the id field true or falser
    7·1 answer
  • In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
    5·1 answer
  • Create a function named PrintStudents, which takes a string input filename and an integer minimum score value and a string outpu
    14·1 answer
  • Describe the functions of ALU, resisters, CU, BIU, Cache and FPU.
    7·1 answer
  • Over the past few years a very definite need has arisen in the electrical trades for:
    15·1 answer
  • Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI
    5·1 answer
  • 12. How many different documents can<br> you have open at one time?
    8·1 answer
  • How can a user restore a message that was removed from the Deleted Items folder?
    10·1 answer
  • Cui documents must be reviewed to which procedures before destruction?
    13·1 answer
  • bailey reads wikis at the beginning of his research project to get his bearings on the topic. he switches to peer-reviewed journ
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!