1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
3 years ago
13

The computer components that enables a computer to send and receive data, instructions or information from one or more computers

or mobile device are
Computers and Technology
1 answer:
ivanzaharov [21]3 years ago
5 0

Answer:

communications device

Explanation:

You might be interested in
What is Automation ? Please give an example ?
Tcecarenko [31]

Answer:

Creation/application of technology to deliver goods/services with little human effort.

Explanation:

For example, manufacturing technology produces products without much need of human intervention.

6 0
3 years ago
Which type of app is the best choice when it is critical to be able to use the device's features but performance is not critical
Alchen [17]

Answer:

The answer is not native. I just got in wrong.

Explanation:

Edge 2021

4 0
3 years ago
Read 2 more answers
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
Gnoma [55]

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

7 0
3 years ago
Elizabeth works for a local restaurant At the end of her shift, she is required
eimsori [14]

Answer:

write the time she arrived at the job and the time she left

Explanation:

6 0
4 years ago
Read 2 more answers
IT professionals should help to protect users’ personal information, such as bank account information or Social Security numbers
sesenic [268]

To prevent theft of account information, identity theft, money, important passwords, and personal information.


Hope it helps ❤️

8 0
4 years ago
Read 2 more answers
Other questions:
  • Create a lottery game application. Generate three random numbers (see Appendix D for help in doing so), each between 0 and 9. Al
    14·1 answer
  • Does players report you on Mobile legends bang bang for playing your own Music while your playing yes or no
    11·1 answer
  • Which of the following is NOT contained on the Slide Show toolbar?
    11·2 answers
  • What is one advantage of inserting a page number field in your document instead of inserting the actual page number?
    14·1 answer
  • When a cells number format is “time” it will show a value in what format
    5·1 answer
  • Which language will report a compilation error for the following snippet of code? int i = 3; double n, j = 3.0; n = i + j; Group
    11·1 answer
  • What Is entered into the system as input?
    13·1 answer
  • The register in the CPU is not the same as the RAM.
    13·1 answer
  • How do you enter the decimal 73 into the computer?
    11·1 answer
  • How do i stop my computer from automatically connecting to a wireless network
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!