1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
3 years ago
11

Windows pe includes networking components and allows you to use current windows drivers for network connectivity.

Computers and Technology
1 answer:
4vir4ik [10]3 years ago
4 0
Indeed it is very true
You might be interested in
Which company is credited with solving a problem by creating a program that could work on all computers?
Ksivusya [100]
It’s Microsoft because it deals with all tech stuff and helps other people out
5 0
4 years ago
If your DTP document contains watermarks on every page, where can you place them?
QveST [7]

Answer:

<h3>You can place watermarks and other recurring elements on a DTP document by following the points below:</h3><h3 />
  • Open the DTP document on which watermark is to be placed.
  • Click on Page Layout tab
  • Locate the Page Background group and click it.
  • Select the Watermark Option and then select Custom watermark.
  • A box will open when you click the Text Watermark.
  • Type the text you want and click on Insert.
  • All other changes can be done using options.

<h3>I hope it will help you!</h3>

6 0
3 years ago
What functionality can a vulnerability scanner provide that a port scanner cannot?
Rina8888 [55]
<span>Sending alerts when new systems are added to the network is the functionality that a vulnerability scanner can provide and a port scanner cannot.
</span>port scanner<span> allows testing of open </span>ports and firewalls. It d<span>iscovers open UDP </span>ports<span> on your target system by </span>scanning with NMAP and by doing so it is<span> the first step of a complete </span>vulnerability<span> assessment. </span>
7 0
3 years ago
What is the common name of computers connected in a network?
ser-zykov [4K]

Answer:

Nodes

Explanation

All of the computers and printers on the network are called nodes of the network

6 0
3 years ago
Create a structure representing a student. The member variables should include student name, student ID, and four test grades fo
Neporo4naja [7]

Answer:

Output:

Name: Brainly

ID:0001

Write the 4 tests grades of the student separated by space :10 9 8 10

Brainly

0001

10 9 8 10

Average :9.66667

'1' to continue '0' to exit :

Explanation:

#include<iostream>

#include<string>

using namespace std;

//variables declaration

struct Student {

  string id; //string declaration ID

  string name; // string declaration name

  int grades[4]; //array of 4 because it is 4 grades

};

//definition of the function get information

void inputData(Student &s){

 

   

   cout << "Name:" ;

   getline(cin,s.name);

   cout << "ID:";

   cin >> s.id;

   cout << "Write the 4 tests grades of the student separated by space :";

   for (int i = 0; i<4; i++)

       cin >> s.grades[i];

}

//definition of the function of average

double inputAvg(Student s){

   double summation;

   int temporary;

   double average;

   for (int i = 0; i<4; i++){  

      for (int j = i; j<4; j++){

         if (s.grades[j] > s.grades[i]){

             temporary = s.grades[i];

             s.grades[i] = s.grades[j];

             s.grades[j] = temporary;

         }

      }

    }

    summation = 0;

    for (int i = 0; i<3; i++){

        summation = summation + s.grades[i];  

    }

    average = summation/3;

    return average;

}

void disp(Student *s){

   cout << s->name << endl;

   cout << s->id << endl;

   for (int i = 0; i<4; i++)

       cout << s->grades[i] << " ";

   cout << endl;

   cout << "Average :" << inputAvg(*s) << endl;

   

}

int main(){

  Student st;

  int ch;

  while(true){

      inputData(st);

      disp(&st);

      cout << " '1' to continue '0' to exit :";

      cin >> ch;

      if (ch == 0)

         break;      

  }

  return 0;

}

6 0
3 years ago
Other questions:
  • Most documents are printed in ______ orientation
    9·2 answers
  • You can use _____ to create multiple letters with the same body or message but are addressed to different people.
    14·2 answers
  • Robert wants to start a mobile app development company that builds apps for both iOS and Android. He is researching different cr
    14·1 answer
  • consider a group of 30 people who wish to establish pair-wise secure communications using symmetric-key cryptography. How many K
    15·1 answer
  • JAVA
    14·1 answer
  • The keyboard shortcut to enter the current date in a field is
    11·1 answer
  • Who is responsible for developing the physical background for the characters by creating buildings, landscapes, and interiors?
    14·1 answer
  • What is another term for additive manufacturing
    7·1 answer
  • Write a Python program that prints all the numbers from 0 to 6 except 3
    8·1 answer
  • an attacker is attempting to crack a system's password by matching the password hash to a hash in a large table of hashes he or
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!