1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
7nadin3 [17]
3 years ago
5

WRITE IN YOUR OWN WORDS:

Computers and Technology
1 answer:
MrRa [10]3 years ago
5 0

Answer:

One major sign of a computer being hijacked is the use of system resource by unknown programs. For example, full memory, high cpu usage, slow start up, crashes and errors, and low avalible storage space.

Explanation:

You might be interested in
Discuss what technologies you might see in use at an enterprise. For example, where would you most likely see fiber-optic Ethern
kvv77 [185]

There are various connectivity technologies that we use to connect. They are Ethernet, Internet (Wireless Connection), Bluetooth, Wi-Fi and Cellular.

Explanation:

  • Ethernet is the direct connection among the devices that are located close to each other in a building. This is used for small scale enterprises.
  • Wi-Fi lets wireless connections among multiple devices without any physical connection. And it is most extensively used in most of the corporate companies.
  • Bluetooth is used to transfer the data from one device to the other when they are near.
  • Cellular is used to connect people across the globe. And it is used widely in every enterprises.
7 0
3 years ago
you are using linux and need to perform a reverse lookup of the ip address 10.0.0.3. which command would you use to accomplish t
ollegr [7]

A command you would use to perform a reverse lookup of the IP address 10.0.0.3 on a Linux system: dig -x 10.0.0.3.

<h3>What is a Linux command?</h3>

A Linux command can be defined as a software program that is designed and developed to run on the command line, in order to enable an administrator (end user) of a Linux network perform both basic and advanced tasks by only entering a line of text.

<h3>What is IP address?</h3>

IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.

In Computer Networking, a command which an administrator (end user) would use to perform a reverse lookup of the IP address 10.0.0.3 on a Linux system is dig -x 10.0.0.3.

Read more on Linux commands here: brainly.com/question/25480553

#SPJ1

3 0
2 years ago
Select three physical forms of storage. USB drive Primary cache Magnetic storage Secondary cache Dynamic RAM Optical drive
Elis [28]

Answer:USB drive

Magnetic storage

Optical drive

Explanation:

hope this helps

6 0
3 years ago
Read 2 more answers
The activity, set of institutions, and processes for creating, capturing, communicating, delivering, and exchanging offerings th
SOVA2 [1]

Answer: Marketing

Explanation: Marketing is the technique which works between the customer and the product producing companies.It is the mechanism in which the products are the produced or created and then sold to the customers with some attractive offers.

Different marketing strategy is made for attracting the audience towards the product purchase by the customer.It involves lot of exciting and attractive offers and schemes to be introduced,large advertising ,promotions etc.

5 0
3 years ago
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however,
tia_tia [17]

Answer: 443

Explanation:

Port 443 will need to be enabled for secure transactions to go through because it is the default port for HTTPS which is the transfer protocol for secure communication.

This way your credit card transactions will be encrypted to ensure protection from those who would seek to steal your data and your money.  

8 0
3 years ago
Other questions:
  • Recursion is memory-intensive because ________. Select one: a. it requires large data values b. it must occur numerous times bef
    11·1 answer
  • This is the formula for the future worth of an investment over time with consistent additional monthly payments and a steady rat
    10·1 answer
  • What need did anti lock brakes address?
    10·1 answer
  • You want to save twenty of your vacation pictures on your computer. Which is the best place to save them?
    6·2 answers
  • Which of the following is true about database queries?
    11·1 answer
  • What should you include in a persuasive speech
    14·1 answer
  • A program that will accept the ages of girls and boys and calculate the total and average age​
    15·1 answer
  • Decimal numbers is equivalent to binary 110
    5·1 answer
  • Neview of related literature happens in two wayo (1) Traditional and
    6·1 answer
  • Puede existir la tecnologia sin la ciencia y sin las tecnicas,explique si o no y fundamente el porque de su respuesta
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!