1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
3 years ago
14

Help plzzzzzzzzzzzzzzzzzzzzzzzzz

Computers and Technology
1 answer:
Reil [10]3 years ago
7 0

B, Parallel ports are faster than serial ports.

A parallel port can move a set of 8 bits at a time on eight different wires, it uses a 25 pin connector, called a DB-25 connector, whereas a serial port only has a DB-9 connector.

You might be interested in
when you enter a url, you’re creating a(n) ____ link, which is the full and complete address for the target document on the web.
RoseWind [281]

Answer:

Hope this helps it is called an absolute link.

6 0
3 years ago
Which of the following sets of data would be represented best in a histogram
PIT_PIT [208]
I’m sorrry but I can only answer this if I know the following. :(
8 0
4 years ago
What at some advantages of creating a powerpoint?
Umnica [9.8K]
 <span>A power point presentation is designed as a presentation tool for any individual that needs to present information in a basic or through the use of a template and/or animated sequences with the flow of information, whether images, [ or text boxes as well as sound if speakers are present; all of which is used to make it more interesting and convey to people. Power point is used for all types of reasons, either for a selling tool such as sales & marketing; academic presentation of certain tasks and pieces of research, et cetera. it can be exported to a PDF or another format to allow further manipulation; it can be saved as a package onto a CD/DVD if you are submitted the presentation by disc. Depending on the version you use, you can customise the way you can present the information itself. Due to the flexibility of the application, if you are for instance using another graphic application to create images and special effects; you can normally drag and drop the content straight into the program without having to import it through the File menu options of Power Point, but again it depends on the version.</span>
8 0
3 years ago
Write a method that determines the total number of chars in each string of an array.
Serjik [45]
The total number of chars in each string is basically the size of each string.

Using JAVA:

        String[] arr = {"hello", "my", "name", "is", "Felicia"};                int count = 0;        for(int i = 0; i < arr.length; i++) {            count = count + arr[i].length();            System.out.println("Characters in " + arr[i] + ": " + count);        }

Output: 
<span>Characters in hello: 5
Characters in my: 7
Characters in name: 11
Characters in is: 13
Characters in Felicia: 20</span>


8 0
3 years ago
what is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulate
Soloha48 [4]

A honeypot is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulated rich content areas while the software notifies the administrator of the intrusion.

What is software?
Software is a grouping of computer programmes, along with auxiliary data and files. In contrast, hardware is the foundation upon which a system is built as well as what actually does the work. Executable code is the lowest level of programming and is made up of machine language instructions that are supported by a single processor, usually a central processing unit (CPU) or even a graphics processing unit (GPU). Machine language is made up of collections of binary values that represent processor instructions that alter the previous state of the computer. One effect that is not immediately visible to the user is when an instruction modifies the value kept in a specific storage location in the computer.

To learn more about software
brainly.com/question/28224061
#SPJ4

4 0
1 year ago
Other questions:
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • You work at a computer repair store. You just upgraded the processor (CPU) in a customer's computer. The computer starts, but it
    11·2 answers
  • Invalid length parameter passed to the LEFT or SUBSTRING function (below)".
    6·1 answer
  • Which of the following statements about the placement of illustrations in documents is true?
    12·1 answer
  • What is the output of the following code snippet? double salary = 55000; double cutOff = 65000; double minSalary = 40000; if (mi
    6·1 answer
  • Which of the following statements about the break statement is false? Group of answer choices Common uses of the break statement
    12·1 answer
  • What frequency band or bands do 802.11g, 802.11a, 802.11n, and 802.11ac use?
    13·1 answer
  • Question 13(Multiple Choice Worth 5 points)
    6·1 answer
  • Which X software package is designed to be a more streamlined and easier to use replacement for the X Window System
    12·1 answer
  • i was wondering if anybody would have a season 1 or 2 or 3 Fortnight account they never use and was gonna ask if i could play on
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!