1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedbober [7]
3 years ago
8

Need answer ASAP

Computers and Technology
2 answers:
Mnenie [13.5K]3 years ago
6 0

Answer:

c is the correct awnser ( to code and test )

Sonja [21]3 years ago
3 0

Answer:

CCCCCCCCCCCCCCCCCCCCC

You might be interested in
Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing at
Zepler [3.9K]

Answer:

Phishing Victim

Explanation:

Replying to this email could make you a victim of a phishing scam. Phishing attacks are common challenges on security that internet users are faced with. It could lead to others getting hold of sensitive information like your password or bank details. email is one way the hackers used to get this information. replying to such an email could lead one to an unsecure website where information could be extracted

4 0
3 years ago
Describe the five components of a computer
Anna [14]

Answer:

Input, Processing, Storage, Output and Communication devices.

Explanation:

Input devices of computer are like Keyboard, Mouse, Scanner. Output devices of a computer are printers, monitors, and headphones.

There are two storages of computer one of them is REM, which can be lost if computer shutdown/closes. Data stays written on the disk until it's erased or until the storage medium fails (more on that later). An example of a communication device is the microphone.

7 0
2 years ago
Choose the correct term to complete the sentence.
Rashid [163]

Answer:

Epoch

Explanation:

5 0
3 years ago
Justine was interested in learning how to play the piano. Before she was allowed to even play the piano, she has had to learn
Setler [38]

Answer:

A

Explanation:

The answer is A because, to be novice at something that means one is new to and is inexperienced at said activity.

3 0
3 years ago
Read 2 more answers
What is the difference between amplifier and the repeater?
mixas84 [53]

Explanation:

Repeater:

  • It is used for the regeneration and transmission in case the previously transmitted signal is weak .
  • It takes higher input power , to provide lower output power .
  • It uses a static environment .
  • It is used for the reduction or elimination of noise .
  • It works on the the physical layer of OSI model.

Amplifier:

  • It is basically used to increase the amplitude or the strength of the signal .
  • It takes lower input power , to provide higher output power .
  • It uses in a mobile and remote network .
  • It  increases the amplitude of the signal of noise .
  • It works in wireless communication .

8 0
3 years ago
Other questions:
  • What are the two major categories of computer software? word-processing software and spreadsheet software applications software
    13·1 answer
  • If you like to spend time outdoors working with plants and animals, you have a(n) _____. a. bodily/kinesthetic learning style b.
    6·2 answers
  • Which career professional and creates large data base and makes the data base with other systems
    13·1 answer
  • 5. Create a vector called to20 that goes from 1 to 20 (use the range notation). Now create a variable called end that goes from
    9·1 answer
  • What are examples of people who own the copyrights of their property? Check all that apply.
    10·2 answers
  • Which of the following activities poses the greatest personal cybersecurity risk? A. Making a purchase on an online store that u
    13·1 answer
  • Char[][] array1 = new char[15][10];
    5·1 answer
  • g Write a program using integers usernum and x as input, and output usernum divided by x four times. For example, if the input i
    14·1 answer
  • You are troubleshooting a mobile device with no sound output from the headset or external speakers.
    6·1 answer
  • A network technician attempts to ping www.example.net from a customer computer, but the ping fails. access to mapped network dri
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!