1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ede4ka [16]
3 years ago
8

an organization wants to use its computer to make video calls with suppliers overseasename two input and two output device that

the organisation must have for this to happen and briefly explain the popruse of each device
Computers and Technology
1 answer:
ratelena [41]3 years ago
7 0

Answer:

an organization wants to use its computer to make video calls with suppliers overseasename two input and two output device that the organisation must have for this to happen and briefly explain the popruse of each device

You might be interested in
Which of the following is true of functions?
Anna11 [10]

Answer:

the answer is D

Explanation:

4 0
3 years ago
Given main() and a base Book class, define a derived class called Encyclopedia. Within the derived Encyclopedia class, define a
alexandr1967 [171]

Answer:

..

Explanation:

i dont really know. I am just answering for the sake of points lol

8 0
3 years ago
The natural language convention used to represent ip addresses is called the:
Katyanochek1 [597]

is there multiple choice options? we need those to be exact..

6 0
3 years ago
Your co-worker is at a conference in another state. She requests that you
aniked [119]

Answer:

C

Explanation:

This is the easiest, quickest, and least destructive method.

3 0
4 years ago
You accidentally find someone's password and use it to get into a system. this is hacking.
Umnica [9.8K]
I'd go with yes, but are you doing something malicious or just being nosey?
4 0
3 years ago
Other questions:
  • Which of the following tasks is least effective at preventing a computer virus?
    14·2 answers
  • You need to delegate AD RMS responsibilities to a junior administrator. You don't want to give the administrator more permission
    14·1 answer
  • 1. Extract title Write a function extract_title that takes one parameter, the filename of a GenBank formatted file, and returns
    14·1 answer
  • Dallas is an analyst at an online retailer. He is great at creating representative diagrams showing the relationships between cu
    12·1 answer
  • In ____________________ testing, security personnel simulate or perform specific and controlled attacks to compromise or disrupt
    10·1 answer
  • A program is run line by line to determine the source of a logic error. Which best describes the specific tool being used?
    11·2 answers
  • Why is it important to do research prior to making a purchase? What types of sources can be helpful (or not helpful!)
    15·1 answer
  • Using pointers and shared memory for IPC, what would you need to add to your code to ensure data integrity?
    15·1 answer
  • A ____________ is a collection of commands given a name.
    11·1 answer
  • Define the term visual as used in visual programming
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!