1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
15

2. True or False: You can create a network with two computers. a. True b. False

Computers and Technology
2 answers:
Andreyy893 years ago
8 0
A computer network is a collection of connected computing devices that may or may not be able to communicate.
So I think yes its true
KonstantinChe [14]3 years ago
4 0

Answer:

True

Explanation:

You might be interested in
Which of the following is planted on an infected system and deployed at a predetermined time?A. Logic bombB. Trojan horseC. Worm
nekit [7.7K]

Answer:

A. Logic Bomb.

Explanation:

A Logic Bomb is a piece of code that is planted in a software system that is infected intentionally to set off malicious function.They are deployed at a predetermined time.

For ex:- a programmer hiding the files that deletes details of the employee who left the company.So these files can never be deleted.

4 0
3 years ago
Which method is useful for dimensionality reduction especially for small data-sets?
Anna [14]
Independent Component Analysis (ICA) is based on information-theory and is also one of the most widely used dimensionality reduction techniques.
8 0
3 years ago
Distinguish between principles, guidelines and standards, using examples of each to illustrate​
AleksAgata [21]

Explanation:

principles is what governs a place

guidelines is what you read to guide you

standards is what build up in your self

5 0
3 years ago
Read 2 more answers
7. When using find command in word we can search?
lesya [120]

Answer:

When using find command in word we can search all of the above

6 0
3 years ago
What should you do first when designing a program?
Nady [450]

Answer: talk about da progrm

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • What do we call the distribution and access of illegal copies of digital books??
    10·1 answer
  • To indent the first line of a paragraph which key should you use
    13·2 answers
  • What tones should be used when writing a business document
    13·1 answer
  • What does the following code print out? (10 points) int[] array = { 1, 4, 3, 6, 8, 2, 5}; int what = array[0]; // scan the array
    14·1 answer
  • Light travels at 3 × 108 meters per second. A light-year is the distance a light beam travels in one year.Write a PYTHON program
    14·1 answer
  • Determine if x(t) is periodic and determine the fundamental period.
    15·1 answer
  • Which type of front usually brings thunderclouds and storms
    14·2 answers
  • Which position most likely requires your Master's Degree for success
    7·1 answer
  • If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should
    6·1 answer
  • What is an example of using the internet of things (iot) to deliver innovative cloud-based solutions to customers?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!