1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reptile [31]
3 years ago
6

Match the term to the correct definition.

Computers and Technology
1 answer:
Sauron [17]3 years ago
5 0
Correct Answer:
1. information processed or stored by the computer
data
2. two or more connected computers
network
3. a unique name that identifies an Internet site
URL
4. instructions that tell a computer what to do
Command
You might be interested in
1. A formula =A1+B2 is in cell D8. If you copy that formula to cell D9, what is the new formula in cell D9?
MaRussiya [10]
1. Answer is B   (D9=<span>A2+B3)
2. </span><span>C. identifies how many cells with data were in the range 
3. </span><span>A. ascending (smallest to largest)
</span><span>4. A. the current worksheet </span>
6 0
3 years ago
Programmers refer to a sequence of characters as a ____.
jekas [21]
In programming they know it as a String which is  a sequence of characters that are composed of literal constants or some kind of variables. A sting is any finite sequence of characters. every single string has its own lenght and this is one of the most important characteristics of them. Strings are essential to communicate information from the program to the user. 
5 0
3 years ago
Somebody supplied me with a file that was edited on a Windows machine. The file contains carriage returns in addition to the new
maria [59]

Answer:

It is  tr.

Explanation:

For removing all the carriage returns you can make use tr like

tr '\r\n' ' '

However, you cannot make use of the diff which finds the difference between the two files.

Onl is definitely not an option and cut holds different meaning that we know, Hence the above answer, tr can definitely help as shown above,

3 0
3 years ago
How do I add pictures to my questions on the mobile app?
taurus [48]
The camera is at the bottom of the screen,Take a pic
8 0
4 years ago
What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b
Paraphin [41]

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

3 0
3 years ago
Other questions:
  • Create an enumeration named Month that holds values for the months of the year. With JANUARY equal to 1, FEBRUARY equal to 2, an
    13·1 answer
  • What is a main cause of a virus on a computer
    6·1 answer
  • The _______ is a small program run by a computer when first powered on. its primary function is to stabilize the machine and dev
    11·1 answer
  • Match the keyword to its definition. 1 . Pixel A device that is not central to the operations of a computer 2 . Peripheral Stand
    10·1 answer
  • At the ________ level of an organization, functional managers focus on monitoring and controlling operational-level activities a
    14·2 answers
  • PLEASEEEE HELPP ILL MARK BRAINLIEST!! in a presentation outline, each slide must represent a main point in the outline. true or
    5·1 answer
  • Who wanna be besties
    8·2 answers
  • Which important aspect of the Roman Empire did the barbarians destroy?
    14·2 answers
  • What does RoHS stand for and why is RoHS compliance important?
    9·1 answer
  • 1
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!