1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
3 years ago
8

Question #1

Computers and Technology
2 answers:
Digiron [165]3 years ago
6 0

Answer:

the answer is 25

Explanation:

because ot is 25 due to the GB

trasher [3.6K]3 years ago
4 0
The answers is 25 because it is 25 due to the GB
You might be interested in
A group of computers that are interconnected order to share information or document is called a
Shkiper50 [21]
Group of computers that are interconnected in order to share information or documents is called <span>Computer network.



                                                            
Hope this helps.
</span>
5 0
3 years ago
Read 2 more answers
12. ______ is considered to be the first video game mascot.
Tatiana [17]
D pac man im hope im right
7 0
3 years ago
What happen if there is no authentication??
creativ13 [48]

Answer:

anyone could access something and hack others

Explanation:

7 0
3 years ago
Read 2 more answers
Select the components of a search engine.
Assoli18 [71]

Answer:

C because whatever a search engine is it will need a search form to do its job, so C (maybe d)

7 0
4 years ago
Read 2 more answers
Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access.
jeyben [28]

Answer:

The answer is "use P2P method".

Explanation:

In Corporation are starting to regard P2P is a method, which enabling workers to transfer files directly, reducing the expenses and construction connected with a central network.

  • It allows corporations to make the use of often latent resources on both the computer for each worker.
  • It will also be forced to control access to data to protect the privacy and sensitive materials, and will also be able to encrypt files by code.

5 0
3 years ago
Other questions:
  • The RAM is a type of ____ a.Main Memory b.Secondary Memory c.Human Memory d.EPROM e.EEPROM
    13·2 answers
  • Your smartphone, digital camera, and printer are all part of a network in your workspace. What type of network is likely in use
    7·1 answer
  • i see tabs named mowed and Ramsey i tried shredding them and deleting them and ending all the processes but they start duplicati
    13·1 answer
  • I'm using my PS4 dual shock controller to connect to the fire stick on the tv so I can play games with it but whenever I try to
    10·1 answer
  • Your task is to improve a multi-threaded program that frequently writes small entries to a shared file by introducing a layer th
    7·1 answer
  • Which kinds of Internet content do you think you need permission to use? Check all that apply.
    8·2 answers
  • A machine on a 10 Mbps network is regulated by a token bucket algorithm with a fill rate of 3 Mbps. The bucket is initially fill
    12·1 answer
  • Which marketing claim do you see on the opening screen of the new words with friends
    14·1 answer
  • Can you answer the fill in the blanks
    15·2 answers
  • Write a program that prints the numbers 1 - 50. If the number is even print the word 'EVEN!' next to it. If the number is odd pr
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!