1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
3 years ago
9

It is impossible to overemphasize the fact that, from the perspective of a computer, a network is a) simply another I/O device.

b) just another hardware component. c) the only device without a controller. d) handled differently than all other I/O devices.
Computers and Technology
1 answer:
marta [7]3 years ago
6 0

Answer:

A) Simply another I/O device

Explanation:

I just know :)

You might be interested in
Type the correct answer in the box. Spell all words correctly.
In-s [12.5K]

Answer:

The answer is "Insert tab".

Explanation:

In the presentation slide components constantly refer to the artifacts in many other presentation software from, which you can bring from the inside of a slide. It involves things like forms, texts, images, videos, and even audio files.  

  • This Insert tab can be found at the head of the PowerPoint software in the toolbar.
  • It allows you to modify the slide, and it also provides a feature to count the number of columns and rows in the table.
7 0
3 years ago
Describe security risks associated with downloading items online
AURORKA [14]

Answer:

1. Hackers could get information and sell it. 2. Hackers can get a hold of your files online. 3. Hackers can look at your photos. Download a VPN

8 0
3 years ago
Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
vodka [1.7K]

Answer:

Link manipulation

Explanation:

With the link manipulation the phisher manipulate the URL link, in this case, the URL can seem similar to an original website, but this link sends you to a fake website, and you enter for example your bank or personal information, the phisher use this data to steal money or delicate data, sometimes these links are sent by email or text messages.

4 0
4 years ago
What can be designed to create annoying glitches or destoey data?...
daser333 [38]

WELL YOU ARE RIGHT its virus

hope it helps

3 0
4 years ago
Read 2 more answers
The Internet is not a good place to connect with people when looking for a job.
djyliett [7]
This is kind of in opinion , i think it is true as people could be on the internet to kidnap or hurt others. It depends on what you think
8 0
4 years ago
Other questions:
  • in a mechanism when the input goes from a small gear to an output which is a larger gear will the speed increase or decrease?
    5·1 answer
  • To transfer data packets between two or more networks, a ________ is used.
    11·1 answer
  • Can you plug a usb 2.0 into a 3.0 port on your computer
    12·1 answer
  • How do I make my own algorithms ​
    8·2 answers
  • What is it called when u want 2 or more cells into 1
    14·2 answers
  • Dr.Sanchez is creating a quiz for a history class. It will have true or false questions. What kind of variable will be needed to
    10·2 answers
  • What should be entered to make the loop print
    6·1 answer
  • In the software development process, which review studies the software design before it is released for coding?
    7·1 answer
  • What is office course<br> how to learn office course
    12·1 answer
  • Why would internet speed test be different on same network
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!