1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Greeley [361]
3 years ago
7

Numdu

Computers and Technology
1 answer:
gizmo_the_mogwai [7]3 years ago
4 0
The question is unclear /unfinished please send again.
You might be interested in
A eclipse occurs at a full moon when the moon passes between earth and the sun
sergeinik [125]

Answer:

When the moon aligns with the sun

Explanation:

common sense

3 0
2 years ago
Do you think that people have a “right” to remain anonymous online? Why or why not?
lara31 [8.8K]

Answer:

Yes

Explanation:

because everyones privacy should be respected

6 0
3 years ago
A(n) ______is like an intranet except it shares its resources with users from a distant location. Select your answer, then click
nasty-shy [4]

An <u>extranet</u> is like an intranet except that, it shares its resources with users from a distant location.

<h3>What is an intranet?</h3>

An intranet simply refers to an internal organizational network which is exclusively designed and developed to be used privately. Also, it is used for providing the employees of an organization with easy access to data and information.

In Computer networking, the end users of an extranet have the ability to access a company's entire intranet from a distant location.

Read more on intranet here: brainly.com/question/2580626

#SPJ1

8 0
1 year ago
How can public-key encryption be used to distribute a secret key?
navik [9.2K]
If you encrypt the secret key with someone else's public key, then only that person can decrypt it with his private key. The encrypted content can be freely shared with anyone, however only the intended recipient can retrieve the secret key since he is the only one with the proper private key.
8 0
3 years ago
The IT department sent out a memo stating that it will start delivering desktop computer interfaces through the IT data center v
Tasya [4]

Answer: Virtual desktop infrastructure

Explanation:

The virtual desktop infrastructure is the virtualization technology in which the host desktop OS (operating system)  is in the centralized server of the data center. The virtual desktop infrastructure is also known as server based computing as it include the variation in the computing model such as client - server model.

The example of the virtual desktop infrastructure is wallpapers, toolbars, window and folder is the stored in the server remotely.

All the other options does not involve with this technology so that is why option (D) is correct.

4 0
3 years ago
Other questions:
  • Which computer device works like the human central nervous system by connecting all the computer’s parts together and allowing t
    9·1 answer
  • A web __________, such as internet explorer or mozillaâs firefox, allow users to access the world wide web.
    10·1 answer
  • Which wireless technology has a typical transfer rate of 1 Mbps to 3 Mbps at distances up to about 10 meters?
    7·1 answer
  • Two technicians are discussing a resistance measurement. Technician A states that components being measured should be removed or
    10·1 answer
  • Which rule should be followed to stay safe online
    5·1 answer
  • The moon has less mass than the earth, so what happens to objects on the moon?
    11·1 answer
  • Can an iphone user see when an android user is typing
    10·2 answers
  • Why 3 phase motors so effective?
    5·1 answer
  • 3s X 82 = X +y? is this true
    10·2 answers
  • Explain the history of computing device of mechanical era
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!