1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nika2105 [10]
3 years ago
5

The process of bringing data or a file from one program to another is called

Computers and Technology
2 answers:
Digiron [165]3 years ago
8 0
The answer is importing
Valentin [98]3 years ago
4 0

Answer:

B. importing.

Explanation:

You might be interested in
A tree can grow on rock as long as its roots can reach soil through cracks in the rock.
ycow [4]
I would say the answer is c
3 0
4 years ago
Networks that are designed to connect similar computers that share data and software with each other are called:_______
sergij07 [2.7K]

Networks that are designed to connect similar computers that share data and software with each other are called: Peer to Peer (P2P) Networks.

<h3>What is a networking software?</h3>

A networking software can be defined as a set of executable instructions (codes) that is typically designed and developed to instruct a networking device on how to perform a specific task or transmit data from one location to another.

<h3>The types of networking software.</h3>

Generally, there are three main types of networking software and these include the following:

  • Security software
  • Connection software
  • Transport software

In Computer networking, Peer to Peer (P2P) Networks can be defined as a type of network that are designed and developed to connect similar computers that share data and software with each other.

Read more on Peer to Peer Networks here: brainly.com/question/1932654

#SPJ1

7 0
2 years ago
When you pass an array to a method, the method receives ______.
7nadin3 [17]
The correct option is 3.
When an array is passed as a parameter to a function, it is usually passed as a reference parameter. What is actually passed is the address of its first element. Since arrays are typically passed by reference, it means that if the function changes the value of an element in an array, then the corresponding actual array will change that element. To declare an array of real values as parameter one has to specify the parameters.
4 0
3 years ago
To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to
ioda

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

5 0
3 years ago
Read 2 more answers
Which source is NOT a valid data source for a mail merge?
IgorC [24]

Answer:

PDF Document

Explanation:

8 0
4 years ago
Read 2 more answers
Other questions:
  • Material science focuses on<br><br> A) Heat<br> B) Solids<br> C) Liquids<br> D) Gasses
    7·2 answers
  • You have successfully compiled the file Hi.java, how do you run the corresponding program from the command line?
    7·1 answer
  • The Maui coffee shop sells coffee at $10.50 a pound plus the cost of shipping. Each order ships for $0.86 per pound + $1.50 fixe
    14·1 answer
  • Define a method named roleOf that takes the name of an actor as an argument and returns that actor's role. If the actor is not i
    11·1 answer
  • when a page contains function is loaded the browser by passes the function without running it - true or false
    7·1 answer
  • Which statement regarding killers is true?
    12·2 answers
  • Demonstrate the register addressing mode for the following instructions. Also what addressing mode belongs to these instructions
    11·1 answer
  • Which of the following describe ALAC audio files? Choose all that apply.
    5·2 answers
  • WHICH PROGRAMMING LANGUAGES ARE THE BEST FOR PROGRAMMING?
    14·1 answer
  • Which of the following tiny computer apps is designed to be useful but could cause more harm than good?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!