1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makvit [3.9K]
3 years ago
14

Use the drop-down tool to select the word or phrase that completes each sentence. Text within a document that is linked to other

information available to the reader is called _______. A unique location for a computer on the network is its _______. The ________ is the ability of a network tor cover after any type of failure. The computer that responds to requests from the client computer is known as the ________. A ________ is an ordered list of tasks waiting to be performed.
Computers and Technology
2 answers:
givi [52]3 years ago
6 0

Answer:

hypertext

IP address

fault tolerance

server

queue

Explanation:

just did it on edg

WINSTONCH [101]3 years ago
3 0

Answer:

1. Hyperlink

2. IP address

3. Fault tolerance

4. Server

5. To do list

Explanation:

Text within a document that is linked to other information available to the reader is called HYPERLINK.

A unique location for a computer on the network is its IP ADDRESS.

The FAULT TOLERANCE is the ability of a network to cover after any type of failure.

The computer that responds to requests from the client computer is known as the SERVER.

A TO-DO LIST is an ordered list of tasks waiting to be performed.

You might be interested in
What would be the best tool to display the following information from a basketball game?
Shkiper50 [21]
A table. Hope this helps friend
4 0
3 years ago
I have this questions i need to make it in a report format pages of atleast 3 pages and maximum of 5 pages​
Nuetrik [128]

First write what is software take one page for that

and each page for all other topics

6 0
2 years ago
Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
antiseptic1488 [7]

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, <u>it would have been better if the writer includes experience with a computer virus</u> so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

3 0
3 years ago
If I use the command right(90), which way will Tracy turn?<br> If correct I mark brainlist
Kaylis [27]

Answer: Right

Explanation: If you use the Command Right (90°), it makes sense that Tracy turns right 90°...

5 0
2 years ago
Students recently created a Gaming Club at their school. On Friday of every week, students bring in their gaming consoles (Xbox,
ozzi

Answer:

first line, that is "The bandwidth of the school’s internet connection is lower than at home" is the correct answer.

Explanation:

The network school bandwidth, speed, and list of phones can all be considerations here. In school might have a network that does not allow high MBPS or via its ISP, it might have a low bandwidth plan. It based on the router's size, frequency, and link of the firewall and gaming network, the bandwidth may be lower.

  • The Most probably, the device isn't the source but it acts in the match were caused by the link.
  • If the school requires the server for transport broadband connections, the network can slow the process through pc specifications and link to either the network.

8 0
3 years ago
Other questions:
  • Ar count = 10;
    13·1 answer
  • Which of the following is NOT true about RMI? RMI uses the socket connection, including opening and closing the socket. RMI allo
    8·1 answer
  • Give me 3 facts and 3 opinions
    5·1 answer
  • ____ is the only automated disk-to-disk tool that allows you to copy data to a slightly smaller target drive than the original s
    5·1 answer
  • Write a program to read a list of exam scores given as integer percentages in the range O to 100. Display the total number of gr
    11·1 answer
  • Which of the following are valid variable names? Select 2 options.
    14·1 answer
  • Read the attached paper titled A Survey of Coarse-Grained Reconfigurable Architecture and comment on it. Make sure to specifical
    5·1 answer
  • Examples of how the development of coding changed the way we live. What type of technology was created as a result of code?
    10·1 answer
  • The RGB value below produces a shade of purple. What does the number 175
    15·2 answers
  • What are backup storage devices of computer? Why are they necessary in the computer system?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!