1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ExtremeBDS [4]
3 years ago
7

Doing free poitns soon!

Computers and Technology
2 answers:
podryga [215]3 years ago
8 0
Yay i got free 5 points thanks
morpeh [17]3 years ago
3 0

Answer:

yay thanks

Explanation:

You might be interested in
Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be u
Artemon [7]

Answer:

Instead of using a key or entering a code to open a door, a user can use an object, such as an ID badge, to identify themselves in order to gain access to a secure area. What term describes this type of object?

Explanation:

6 0
3 years ago
When did internet came to existence?
Luden [163]
1982 the Internet protocol was introduced as the standard network protocol on the ARPANET.

1981 access to the ARPANET was expanded.
7 0
4 years ago
When you make a cell phone call, which type of electromagnetic wave is most likely transmitting the signal?
Olegator [25]
They use Radio waves 
6 0
3 years ago
Files and e-mail messages sent over the Internet are broken down into smaller pieces called _____.
Fynjy0 [20]
Files and email messages sent over the internet are broken down into smaller pieces called packets
6 0
3 years ago
Which of the following terms describes a type of useful and legitimate software that is distributed by a developer where they do
brilliants [131]

Answer:

freeware

Explanation:

a freeware is a software that is available free of charge but is not distributed with the source code.

6 0
3 years ago
Other questions:
  • 8 POINTS!!!!!!!!
    6·2 answers
  • What kind of firewall can block designated types of traffic based on application data contained within packets?
    7·1 answer
  • Databases can have various objects some of which are tables, queries, forms or views, and reports objects. Each of these has fie
    14·1 answer
  • A computer is defined by 4 specific criteri. Select all 4.*
    7·1 answer
  • Which of the four control methods is best suited for transfer of large blocks of data?
    8·1 answer
  • If your machine is not used as a server and is not on a local network, what packet-filtering strategy should you use?A. Block al
    12·1 answer
  • MULTIPLE CHOICE QUESTION PLEASE HELP!!!!!!!!!
    14·2 answers
  • A10:A20 Refer to values in
    8·1 answer
  • WILL MARK BRAINLIEST FOR ANYONES ANSWER!
    12·1 answer
  • What is the decimal number 86 when written as a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!