1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vampirchik [111]
3 years ago
8

You would like your presentation to toggle to the Internet to play a news clip. Which feature will accomplish this?

Computers and Technology
2 answers:
Over [174]3 years ago
6 0

Answer:

Video from website

Explanation:

Valentin [98]3 years ago
6 0

Answer:

D is correct.

Explanation:

On Edge.

You might be interested in
You want to be able to access your home computer using remote desktop while traveling. you enable remote desktop, but you find t
solong [7]
Get a program for this perpose or perhaps get a new computer
5 0
3 years ago
Read 2 more answers
. Is it conceivable to design a secure operating system for these computer systems? Give arguments for and against.
Lena [83]

Answer:

A favor:  porque permite manejar la memoria, disco, medios de almacenamiento de información y los diferentes periféricos o recursos de nuestra computadora, como son el teclado, el mouse, la impresora, la placa de red, entre otros.

En contra:

Si uno llega a fallar con un codigo en algun sistema puede verse afectado el dispositivo

Explanation:

8 0
3 years ago
Which port security violation mode does not generate messages or increment the violations counter?
Zanzabum

The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

<h3>What is  offence?</h3>

A deviation from a code of conduct or law is referred to as a violation. When driving a car, going over the posted speed limit is a regular legal violation. Invading someone else's privacy could include reading their journal. failure to uphold a duty or right; breaching the law.

The two types of violations are states and acts. A transgression is a violation of the rules that is less serious than a foul and frequently involves technicalities of the game. A disrespectful or vulgar act: profanation.

Hence, The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

To learn more about violation, refer to:

brainly.com/question/1274113

#SPJ4

4 0
2 years ago
How are 8-position, 8-contact (8P8C) modular connectors pinned to unshielded twisted-pair (UTP) cable, which is used for connect
AleksandrR [38]

An unshielded cable are twisted pair is used to connect modem in telecommunication industry to connect computer through telephone cable, Ethernet cables it is called as UTP cables.

<u>Explanation:</u>

These UTP cables are twisted cables where conducted are used in form of single circuit.

These types of UTP cables used to connect modem to establish connection to other networks for internet or connecting to other side computer or desktop or laptops.

UTP cables uses  rj-45 or rj-11  or rs232 or rs 499. Normally rs-45 with cat 5e cable is used to connect LAN. Rj-11 is used to connect to modem for dial purpose.

If we use ip networks RJ-45 will do both.

8 0
3 years ago
The process of determining that a user has permission to perform a particular action on a computer is called
Doss [256]
I believe that would be authorization.
5 0
4 years ago
Other questions:
  • NEED HELP ASAP!
    13·1 answer
  • PLEASE HELP ASAP!!!
    15·2 answers
  • Which of the following devices is used to connect a computer to a network
    7·1 answer
  • What is the role of programmers in an organization?
    6·1 answer
  • Which skill refers to the ability to visualize and implement possible business solutions to problems?
    6·1 answer
  • Which animation effects allow text or images to show movement on a slide? Check all that apply. Entrance, Emphasis, Exit, Motion
    5·2 answers
  • In a network, a computer that performs specific services for other computers on the network is called a
    5·1 answer
  • Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    14·1 answer
  • This whole page needs to be done please help?
    13·1 answer
  • A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!