1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vesna_86 [32]
3 years ago
12

Drag the tiles to the correct boxes to complete the pairs.

Computers and Technology
1 answer:
lianna [129]3 years ago
4 0

Answer:

software

client devices

hardware

Explanation:

Plzzzzzzzzzzzzz give me brainiest

You might be interested in
You have a large TCP/IP network and want to keep a host's real time clock synchronized. What protocol should you use?
sweet-ann [11.9K]

Answer: NTP ( Network time protocol)

Explanation:

Network time protocol is the time server which basically works in the TCP and IP network. It rely on the UDP ( User data-gram protocol) at port 123.

NTP server is the dedicated network time protocol devices which basically use for synchronize the network.

It is basically design to synchronize the clock in the computer and across the internet network and local area network. NTP server basically maintain the quality of the reference clock time.

4 0
3 years ago
OSHA's mission is to: A. Ensure that all workers receive adequate workers' compensation payments B. Esnure that all workers rece
umka2103 [35]
Your answer is C, <span> 
The Occupational Safety and Health Act of 1970 protects working men's and women's safety.</span>
4 0
3 years ago
Read 2 more answers
Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
Ivahew [28]

Answer:

The answer is "Confidentiality".

Explanation:

Data Security is also known as protection against unauthorized computer access, files, and pages through digital information protection. The protection of data also prevents data from bribery.  

  • It applies to both the security of data from unwanted entities being obtained.
  • It allows accessing sensitive data, which may be able to do so.
4 0
4 years ago
What is the name of the function below?<br><br> function go(){<br> alert("hello everybody");<br> }
labwork [276]

Answer:

It’s Java script I think and it makes something say hello everybody

Explanation:

6 0
3 years ago
Define computer architecture?
tia_tia [17]

Answer:

computer architecture is a set of rules and methods that describe the functionality, organization, and implementation of computer systems. The architecture of a system refers to its structure in terms of separately specified components of that system and their interrelationships.

4 0
2 years ago
Other questions:
  • How do the search methods differ for primary and secondary data?
    10·2 answers
  • How can you best protect yourself when using social media
    5·2 answers
  • // This pseudocode is intended to display // employee net pay values. All employees have a standard // $45 deduction from their
    12·1 answer
  • You can use RWA to demonstrate how to do something special on the web, such as displaying articles found on websites that suppor
    15·1 answer
  • Which term describes the situation wherein a jury fails to reach a unanimous verdict? A occurs when a jury cannot reach a unanim
    14·1 answer
  • _____ can render data useless to unauthorized users who might have violated some of the database security layers.
    7·1 answer
  • What do you call the spreadsheet cell that is in effect and has a heavier black border around it?
    7·2 answers
  • When you're working on an image, it's a good idea to make a ____________ of the image, so that you'll have the original image in
    12·2 answers
  • Once secured a wheelchair may move up to 6 inches in any direction
    6·1 answer
  • The signature area in a cover letter includes the sender's first and last name, followed by his/her job title (if applicable). *
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!