1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
3 years ago
7

Hubs hardware advantage's and disadvantages​

Computers and Technology
1 answer:
marin [14]3 years ago
6 0

Answer:

answer in picture

hope it's helpful

You might be interested in
In order to create a horizontal 2-inch-thick dotted green line exactly 2 inches away from the top of the canvas, a graphic artis
Harrizon [31]

Answer:

I Think meter .

Explanation:

Not so Sure

4 0
3 years ago
Read 2 more answers
____ are likely in the event of a hacker attack, when the attacker retreats to a chat room and describes in specific detail to h
Masja [62]

Answer:

Follow-on incidents.

Explanation:

When the hacker hacks something successfully and after that when he or she  discusses or describes the details to his or her associates and the method which he or she used to do the hacking is called Follow-on incidents because the hacker has successfully completed his or her conquest the event is happening after that.

4 0
4 years ago
You can use any font when creating your website as all users can see the same fonts.
Anastaziya [24]
False, think about the people with low vision. Think about the font and what size it would have to be,the color (ex. yellow would not be good), Spacing, tracking etc. Just a few things to consider.
3 0
3 years ago
Code written by computer programmers is translated to binary code, so computers can understand the instructions. True or False
san4es73 [151]

Answer:

True

Explanation:

High-level languages such as Java, C++, Ruby, Python, etc need to be translated into binary code so a computer can understand it, compile and execute them.

Machine language is the only language that is directly understood by the computer because it is written in binary code. But writing codes in Machine Language is tiring, tedious, and obsolete as no one really uses it anymore.

7 0
3 years ago
Which of the following is NOT a possible combination of values of the variables in this program when it finishes running?
Nady [450]

Answer:

Definitely D

Explanation:

When you flip a coin it’s a 50/50 chance. Meaning it’s equal.

7 0
3 years ago
Read 2 more answers
Other questions:
  • The process of saving files to disk is called.<br> A.read<br> B. Write<br> C. Lock<br> D. Protect
    6·1 answer
  • A dog walks 10 km north in 2 hours and then 8 km south in 1 hour.
    10·1 answer
  • Imagine a switch with three configured VLANs. How many IP subnets are required, assuming that all hosts in all VLANs want to use
    14·1 answer
  • In the Microsoft Office Suite, what tells a database what to insert information in the document? 
    8·1 answer
  • No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program
    9·1 answer
  • Read two numbers from user input. Then, print the sum of those numbers. Hint - Copy/paste the following code, then just type cod
    9·1 answer
  • Create two functions to calculate the area and circumference of the circle using pointer.
    12·1 answer
  • Why can a bank afford to pay an interest rate on a savings account?
    11·1 answer
  • HELP!!!!!
    15·1 answer
  • Please help, you don’t have to answer it i just need to know the best types of conversions
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!