1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vitek1552 [10]
3 years ago
15

The network ____, the person overseeing network operations, uses a server operating system to add and remove users, computers, a

nd other devices to and from the network.
Computers and Technology
1 answer:
maksim [4K]3 years ago
7 0
The network operator , the person overseeing the network operations
You might be interested in
What is the oldest malware victor
arsen [322]

Answer:

The oldest malware vector was emails.

Explanation:

Websites were not widespread early on into the internet, however it was very easy to have a virus that uses an email contact list, where it can send itself to other email addresses and spread.

7 0
3 years ago
A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
alekssr [168]

Answer:

incremental

Explanation:

An incremental backup backs up only the files on a computer that have changed since the last time a backup was performed.

3 0
3 years ago
Which word best completes the comparison of Beowulf and Grendel?
Hatshy [7]

Answer:

sympathetic

Explanation:

If you will have a go at Beowulf, you will find that Grendel is a dangerous demon for whom humanity means nothing, and people for him are just like something that is to be eaten. However, when you will have a go at Grendel, you will find that he is not just a beast without the brain, as he does have affection and conception.

4 0
3 years ago
Read 2 more answers
It is a function that removes an existing file from the server.
kondaur [170]

Answer: A) remove()

Explanation:

 The remove() function removes an existing file from the server but it does not affect the existing directory and file. We can also ease and remove files in the file handling by using the remove() function. And it is built-in function that removes any type of the data from the function by taking values in the parameter whose values are equal with the passing value in the parameter.

7 0
3 years ago
What is RAM and ROM​
Aleonysh [2.5K]

Answer:

Read-only memory, or ROM, is a form of data storage in computers and other electronic devices that can not be easily altered or reprogrammed. RAM is referred to as volatile memory and is lost when the power is turned off whereas ROM in non-volatile and the contents are retained even after the power is switched off.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Ideation includes all of the following EXCEPT
    5·1 answer
  • Which of the following data recording procedures is best used for behaviors that have a clear ending and beginning, do not occur
    12·1 answer
  • Anyone wanna play Smash Ultimate. I'm a Link main (that doesn't mean I camp, thats young link) who plays competitve with legal s
    8·1 answer
  • Over the past year alone, more than _________ have been stolen from Target.
    10·2 answers
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    11·1 answer
  • Both UDP and TCP use port numbers to identify the destination entity when delivering a message. Give at least one reason for why
    12·1 answer
  • can someone tell me what to do i’m kinda stuck and don’t know what he’s telling me to do pls ill give brainlist and points
    13·1 answer
  • ____ is a technology that exists inside another device
    9·2 answers
  • Which of the following described a global network connecting billions of computers and other
    10·2 answers
  • View One | View All
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!