1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artemon [7]
3 years ago
6

Please answers the questions 1-15

Computers and Technology
1 answer:
Elenna [48]3 years ago
7 0

Kindly note that these are answers to the questions and it took me a lot time to answer. I have offered an explanation to each answer. The maximum number of characters that Brainly is able to support is 5000 characters. The reason I have attached the Word document is because the answers provided are beyond the 5000 characters limit. Understand that this is researched work. I will attach the document once again.

Download docx
You might be interested in
Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:
yan [13]

Explanation:

We can divide the multiplex in different categorize, for example:

  • FREQUENCY DIVISION MULTIPLEXERS (FDM)
  • TIME DIVISION MULTIPLEXERS (TDM)
  • STATISTICAL TIME DIVISION MULTIPLEXERS (STDM).

But in this case, we're going to explain about the time and frequency, because the time division multiplex differ to frequency, because the circuit is divided horizontally, and the time is vertically

b. splits the communication circuit vertically (with time slots) instead of horizontally

7 0
3 years ago
Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following
uysha [10]

Answer: A) Phishing

Explanation:

Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain  confidential information like pin code, credit card number, login details etc of that user.

  • According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
  • Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
  • Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
  • Thus, the correct option is option(A).
0 0
3 years ago
What percentage of teens plays video games?<br><br> A.97%<br> B.100%<br> C.74%<br> D.50%
inna [77]

Answer:

This would all depend on what kind of video games you are talking about, most people would say that playing on you phone is like playing a game on a console or a PC.  

most kids do play on these three things, so I'm going to go with answer choice C.

Explanation:

Reason why is because just like there are many who play, there are many who don't. I being one who prefers to read would like to make it known that not all teens do play video games, and that there are plenty of those who would rather do something productive.

7 0
3 years ago
Read 2 more answers
1.
aliya0001 [1]
#1 is D #2 is B #3 is A #4 is D #5 is B
3 0
3 years ago
Read 2 more answers
What are the four forms of utility in computing
pshichka [43]

Answer:

form, place, time, and possession utility

Explanation:

4 0
3 years ago
Other questions:
  • Which of the following sentences is written in the active voice
    12·2 answers
  • Are the actions legal or illegal?
    13·1 answer
  • Which of the following countries have mixed-market economy
    5·1 answer
  • Identify a characteristic of electronic meeting systems.
    10·1 answer
  • For BitTorrent, which of the following is true:
    6·1 answer
  • Melissa is writing a class called Cell. Which method has she set up to return a double?
    7·1 answer
  • In a block of addresses we know the IP address of one host is Roll no. Roll no. Roll no. Roll no./20.What is the first address a
    11·1 answer
  • Which of the following class definition defines a legal abstract class Group of answer choices public class Rectangle abstract {
    15·1 answer
  • A data table is a range that displays what?
    15·2 answers
  • Question of Computer science​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!