1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
3 years ago
13

Two friends can share 100 songs from their Bluetooth enabled mobile devices

Computers and Technology
1 answer:
Umnica [9.8K]3 years ago
6 0

Answer:

A

Explanation:

If they are connected via bluetooth, you can share unlimited amounts of anything.

You might be interested in
Will a logic error be found if a program is compiled?
natali 33 [55]
No. The computer dose not understand what you are attempting to do, therefore it will not understand how to check for logic errors. The compiler will only check for syntax errors.
6 0
3 years ago
Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
diamong [38]

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

7 0
3 years ago
Which statement best describes antivirus software?
valentina_108 [34]
It identifies and removes viruses in computers
7 0
4 years ago
George is only familiar with VGA connector for monitors. What should you tell him are the main differences between VGA and DVI c
lara [203]

Answer:

That a DVI connector looks different and that it support more monitors.

Explanation:

3 0
3 years ago
Write a python coding to input ten random numerical vales to a list. And display the list. Use a loop structure to enter values.
Zarrin [17]

Answer:

000110011111000010010101001001

Explanation:

8 0
3 years ago
Other questions:
  • Assume that we would like to expand the MIPS register file to 128 and keep the size of all other fields as in the original MPIS
    7·2 answers
  • What should a consultant recommend to meet this requirement?Universal containers assign its contact center agents to certain int
    12·1 answer
  • What kind of a bug is 404 page not found
    10·2 answers
  • How do open online courses help with independent learning
    6·2 answers
  • In a well-developed paragraph - using domain-specific vocabulary and academic writing - address the following writing prompt:
    12·1 answer
  • 8.10 Code Practice Question 3
    6·1 answer
  • Which of the following is NOT an example of soft skill?
    10·2 answers
  • HLOOKUP is used for Horizontal Data look ups while VLOOKUP is for Vertical Data look ups
    8·1 answer
  • 2. What is the MOST common experience LGBTQ+ individuals share when accessing medical trea
    9·1 answer
  • Advantages of monolithic operating system? ​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!