1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Solnce55 [7]
3 years ago
14

____ is a limited version of windows that allows you to use your mouse, screen, and keyboard but no other peripheral devices.

Computers and Technology
1 answer:
Gnoma [55]3 years ago
8 0
'SAFEMODE' <span>is a limited version of windows that allows you to use your mouse, screen, and keyboard but no other peripheral devices.</span>
You might be interested in
What elements are needed in a workstation domain policy regarding use of antivirus and malicious software prevention tools?
Reika [66]
The server should be able to block unauthorized access, a good firewall but still, enable those authorized to have an access. However, there should be security on vulnerable parts of the system that may lead to corruption and easy access to data thieves.
3 0
3 years ago
Use the drop-down menus to complete the statements about creating a table of contents in Word 2016.
siniylev [52]

Answer:

1.headings and subheadings

2.manually

3.options

6 0
3 years ago
It is used between two or more computers. One computer sends data to or receives data from another computer directly.
dmitriy555 [2]

Answer:

File transfer protocol (FTP)

Explanation:

An information can be defined as an organized data which typically sent from a sender to a receiver. When a data is decoded or processed by its recipient it is known as information.

Generally, there are several channels or medium through which an information can be transmitted from the sender to a receiver and vice-versa. One of the widely used media is the internet, a global system of interconnected computer networks.

There's a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport later, into small chunks called packets rather than as a whole.

The three (3) main types of TCP/IP protocol are;

I. HTTP.

II. HTTPS.

III. FTP.

File transfer protocol (FTP) is used between two or more computers. One computer sends data to or receives data from another computer directly through the use of network port 20 and 21.

4 0
3 years ago
Which type of firewall policy calls for a firewall to deny all traffic by default?
charle [14.2K]
Restrictive policy is a kind of policy calls for a firewall to contradict all traffic by default. The first rule denies all traffic on any service and using any port. To permit a specific type of traffic, a new rule must be placed ahead of the deny all rule. A firewall should enforce the overall policy recognized by the network administrator. Enforcement is controlled mainly over setting up packet filtering rules which is a rule base comprises a set of these rules. 
3 0
3 years ago
Assuming you can use infinite number of CPUS for performance improvements, what would be the maximum speed up when the paralleli
natita [175]

Answer:

correct option is D i.e. 20

Explanation:

Given data:

Parallelizable portion is  given as 95%

so remaining will be serial portion i.e. 5%

we know that, for infinite number of cpus, maximum speed is calculated as

v =\frac{1}{f}

where f denote serial portion = 5% = 0.05

v = \frac{1}{0.05}

v = 20

hence so for serial portion of 5%, maximum speed is 20

correct option is D i.e. 20

3 0
3 years ago
Other questions:
  • Point mode allows you to select cells for use in a formula by using your finger or the pointer
    7·1 answer
  • Which best describes what online reading tools aim to help readers do? *100 POINTS*
    9·2 answers
  • If the algorithm does not have instructions for unanticipated results, the computer program will a. solve a problem b. start ove
    6·1 answer
  • How many strings with five or more characters can be formed from the letters in seeress?
    15·1 answer
  • Consider the code fragment below. Show the values stored at each location in memory and as they change while the code executes.
    5·1 answer
  • Wrtie down some containerization technology.
    11·1 answer
  • What best describes "broadband access"?
    13·1 answer
  • Project manager Kevin has to create a project team organizational chart. Which activity should he perform before creating this c
    9·1 answer
  • after entering backstage view, and clicking account settings, what are the steps for creating a delegate for an outlook folder
    6·1 answer
  • 1. Which of the following is not true about high-level programming language s? (a) Easy to read and write (b) Popular among prog
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!