1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kkurt [141]
3 years ago
11

Which of the following allows computers to communicate with each other? RAM NIC Hard drive Floppy disk

Computers and Technology
1 answer:
alexandr402 [8]3 years ago
8 0

Answer:

NIC (Network Interface Card)

Explanation:

A network interface card is used to connect a computer to a computer network allowing for data to be transmitted between computers.

You might be interested in
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
From the set ( 5 , 7 , 9 , 11 , 13 make the inequality w - 4 < 8 true
Ksenya-84 [330]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

7 0
4 years ago
In order for you to make a wireless connection it must first find an availble
erastova [34]
It sounds like you are looking for a network. If a node can not find a network to connect to, then it cannot connect.
7 0
3 years ago
Kali linux os and window os who is the best​
kogti [31]

Answer:

Windows

Explanation:

It is down to preference. I prefer windows due to its large compatibility with a wide range of apps.

4 0
3 years ago
Read 2 more answers
The algorithm will produce a different output depending on the specific secret key being used at the time. The exact substitutio
Paha777 [63]

Answer:

The answer is "Option A".

Explanation:

Step by step execution of any task is also known as algorithm, It is an easy way to solve any problem. The algorithm is used for software and statistical analysis, measurement and other similar activities.  

  • It is also used to solve complex problems in different ways, with particular cases attach to a new information item, search for a certain product, or form an item.
  • It depends on the particular private key, which is used in the time, that generates another output, which is the approximate replacement, and the transition of the dataset depends on the key.
5 0
4 years ago
Other questions:
  • Which of the following careers is part of the Printing Technology pathway?
    10·1 answer
  • TLS is not generally compatible with SSL because:__________. 1. SSL is proprietary while TLS is open 2. SSL can interact with it
    10·1 answer
  • A new company is upgrading a media workstation. The computer will be predominantly used for graphic intensive presentations, sli
    13·1 answer
  • 11.19 LAB: Max magnitude Write a function max_magnitude() with two integer input parameters that returns the largest magnitude v
    7·1 answer
  • The part you should check first when you are servicing a sparking universal motor is the A. commutator. B. armature. C. brushes.
    9·1 answer
  • In an ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
    7·1 answer
  • A_______is a limitation imposed on the engineer. It can be a limitation on
    5·1 answer
  • Which characteristic of a relational database distinguishes it from a flat file?
    5·1 answer
  • Test unit 8 edhesive answers ​
    15·1 answer
  • (Find the number of uppercase letters in a string) Write a recursive function to return the number of uppercase letters in a str
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!