1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oxana [17]
3 years ago
6

What was software for modems that connected through phone lines called?

Computers and Technology
1 answer:
balandron [24]3 years ago
4 0

Answer:

Best Regards to all of the people who have met you in the class

You might be interested in
_________ is the process of scanning the network to find out which Internet Protocol (IP) addresses are attached to potentially
andre [41]

Answer:

Host discovery

Explanation:

Hot discovery is one of the preliminary stages of network reconnaissance, it begins with different IP addresses that belongs to a particular network and adopts various methods to scan and know if a host is at the IP address. Host discovery is also known as ping scan when a sonar analogy is used.

Host discovery helps to scan the particular type of host on one's network.

5 0
3 years ago
One condition for deadlocks is the circular-wait condition. One way to ensure that this condition never holds is to impose a tot
Artyom0805 [142]
<h2>Dead lock is possible in Bank Transactions</h2>

Explanation:

Let us understand the term "Dead lock"

A deadlock is a situation where whole set of process is locked, since each of the process is waiting or holding the resource of another process. Each process will be interdependent and waiting for the same resource.

Deadlock is possible during bank transaction in the following situation:

A & B are two accounts where A tries to transfer funds to B and B tries to transfer fund to A.

When both tries to transfer funds at the same time, deadlock occurs.

A deadlock can be avoided by any one of the four methods.

They are: Mutual exclusion, No preemption, circular wait, hold and wait.

4 0
3 years ago
Read 2 more answers
Which of the following is an advantage of using
SVETLANKA909090 [29]

Answer: preserves cell formatting and formulas

saves time

avoids copy-paste

organizes data so it is easier to draw comparisons

Explanation: just did it

8 0
3 years ago
Read 2 more answers
A large amount of data is stored in secondary storage is it true<br>​
Mice21 [21]
Since it’s more cost efficient, it’s better to store more data in the secondary storage. Yes true!
6 0
3 years ago
Read 2 more answers
NEED HELP RIGHT NOW!!! Which of the following is the definition of a privacy policy? * 5 points - A legal document that an app o
Marina86 [1]

Answer:

A legal document that an app or a website must provide to describe the rules the company and users must obey when they use the app.

6 0
3 years ago
Other questions:
  • 4. When you're working with a word processing document and you press the Del key, what happens?
    8·2 answers
  • Your dad just purchased a new desktop with Windows 8 Professional. He is calling you, informing you that he is unable to remote
    9·1 answer
  • Why is wearable technology important?
    12·1 answer
  • Which system tool allows you to manage the available space on your hard disk to improve efficiency? A. ScanDisk B. Anti-Virus C.
    10·1 answer
  • A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
    8·1 answer
  • ____ allows you to control how objects enter, move on and exit slides
    13·2 answers
  • If you want Nud3s add me on sc Kermit4lyfe1
    11·2 answers
  • How are IP addresses usually written?
    7·1 answer
  • Suppose a family has had a house fire in which
    7·2 answers
  • Write an application named Hurricane that outputs a hurricane’s category based on the user’s input of the wind speed. Category 5
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!