1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex787 [66]
3 years ago
15

Hello can you please help with this if you want to thank you!

Computers and Technology
2 answers:
nikklg [1K]3 years ago
8 0

Answer:

hardware and software is the answer

Snezhnost [94]3 years ago
6 0
Hardware and software is the answerrrr
You might be interested in
Use search engines and websites to research the following WAN technologies to complete the table below:
Yuki888 [10]

Answer:

Explanation:

I am attaching the table as an image with updated table containing required information for the following WAN technologies.

T1/DS1 => Digital Signal 1 (T-Carrier 1),

T3/DS3 => Digital Signal 3 (T-Carrier 3),

OC3 (SONET) => Optical Carrier 3 (Synchronous Optical Networking),

Frame Relay,

ATM => Asynchronous Transfer Mode,

MPLS => Multi-protocol Label Switching,

EPL => Ethernet Private Line.

Although you have mentioned most of the information yourself, there were some wrong data in it.  So I have updated them with correct information in the attached table.

4 0
3 years ago
Read 2 more answers
The purchase of one cup of coffee a day what's going to do
xz_007 [3.2K]
Well if you add it up , if one cup of coffe is $1, then in one year it would be $365 on coffe.
7 0
3 years ago
Read 2 more answers
any one that owns a chrome book there is a new update there is new features and there is a game on settings where you see what y
timama [110]

Answer:

THANK YOU SO MUCH! I AM ON MY CHROME BOOK RIGHT NOW AND WAS HESITATING TO DOWNLOAD THE UPDATE!

Explanation:

4 0
3 years ago
Read 2 more answers
You are asked to provide a list of security groups a user is a member of. You write a script to pull the data from Active Direct
Whitepunk [10]

Answer:

I have no clue. I wish I could help though.

Explanation:

Sorry

7 0
4 years ago
A person who breaks into a computer, network, or online site is called
dybincka [34]

Answer:

B: Hacker

Explanation:

literally anything else aren't even real things besides hacker.

5 0
3 years ago
Read 2 more answers
Other questions:
  • The North American Free Trade Agreement (NAFTA) among Canada, Mexico, and the United States is intended to _____.
    5·2 answers
  • Yahoo! allows users to create personalized my yahoo! pages. users can add or delete a variety of information from their personal
    8·2 answers
  • Explain how to identify a starting position on a line.
    15·2 answers
  • Which is a description of phishing?
    7·1 answer
  • Which sign or symbol will you use to lock cells for absolute cell reference
    5·1 answer
  • A word object in an excel worksheet to activate the word features
    9·1 answer
  • A student is curious about how a Web site appears on his computer screen. On a piece of paper,
    9·1 answer
  • What is the encryption cipher that was the precursor to des??
    5·1 answer
  • Although some families have more resources than other families, there is always a limited amount of resources that families have
    15·2 answers
  • 4.7 Code Practice: Question 2
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!