Answer:
Ray is part of a line that starts at one point and extends forever in one direction.
Explanation:
In geometry, a ray can be defined as a part of a line that has a fixed starting point but no end-point. It can extend infinitely in one direction. On its way to infinity, a ray may pass through more than one point. The vertex of the angles is the starting point of the rays.
<u>Extra</u>
B. A part of a line with two endpoints?
line segment
A line segment has two endpoints. It contains these endpoints and all the points of the line between them. You can measure the length of a segment, but not of a line. A segment is named by its two endpoints, for example, ¯AB.
The power supply and the Hard drive are the two components that makes loud whining noise when a problem is detected.
<u>Explanation:</u>
- Computers can undergo what's called “coil whine,” which is a high-pitched noise that originates from the computer.
- coil whine is an unacceptable noise emitted by an electronic component vibrating as power runs through an electrical cable.
- It's easy to infer that the noise is an indication of influential computer malfunctioning or that something is cut, disconnected, or about to collapse.
- It is normally caused by an electrical current passing through a power-regulating component like a transformer or inductor, inducing its electrical wiring to vibrate at a shifting frequency.
- Luckily, coil whine is normal behavior.
Answer:
The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.
It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.
Explanation:
Solution
One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.
The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.
As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options
Answer:
its B the person in the comments were right
Explanation:
took an edge test
Answer:
Device B is Router.
Explanation:
Router is the device that is used to connect different networks to communicate with each other to make possible for all devices of all networks to communicate with each other that are connected to that particular network.
In above case, Device A is 8 port switch that makes a network of 8 different computers. Device C is a 4 port hub that is connected with 4 computers. Both Device A and Device C are different Networks, router is used to connect both all devices of both networks so that they can communicate each other. So the Device B should be router.