1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maslowich
3 years ago
6

.A card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected

to a network via cables is called
Computers and Technology
1 answer:
Temka [501]3 years ago
6 0
A NIC is a computer expansion card for connecting to a network
You might be interested in
What authentication protocol is ticket-based and is used by windows computers that are members of an active directory domain?
Temka [501]
Your IP address, also known as Internet Protocol
7 0
3 years ago
What is the duty of WHH? (white hat hackers)<br><br><br>ANY WHH HERE?<br>​
Minchanka [31]
White hat hackers use their capabilities to uncover security failings to help safeguard organizations from dangerous hackers. They can sometimes be paid employees or contractors working for companies as security specialists who attempt to find gaps in security.
6 0
2 years ago
You browsing internet and you realize that its not responding what do you do with out rebooting the computer
Allisa [31]
You can try and turn wifi off then on press save on whatever you were doing if you can then reboot it. other then that theres not many more options.
4 0
4 years ago
Use the drop-down menu to identify which command is used to do the activities.
Ronch [10]

Answer:

1.  save and save as

2. save as

3. save as

4.save as

5. save and save as

Explanation:

just took did the question

6 0
3 years ago
_____ is the unauthorized entry into a computer system via any means
Montano1993 [528]
Hi,

The word you are looking for is "Hacking".

"Hacking is unauthorized entry into a computer system via any means."

Hope this helps.
r3t40
4 0
3 years ago
Other questions:
  • Into which of these files would you paste copied information to create an integrated document?
    13·2 answers
  • Create a cell array, called A, with the following contents: a. Make a copy of A called B. (Nothing complicated: B = A is suffici
    10·1 answer
  • True or false. Embedding only part of a font is called presetting.
    14·1 answer
  • Select the term below which is a protocol that provides a method for software components to communicate, interact, and share dat
    6·1 answer
  • The default (preset slide layouts are set up in ____ orientation.
    15·1 answer
  • Consider an application that transmits data at a steady rate (for example, the sender generates N-bit unit of data every k time
    7·1 answer
  • Use a switch statement to display "one" if the user has entered 1, "two" if the user has entered 2, and "three" if the user has
    14·1 answer
  • Have all of my coins because i will delete acount there will be part 2, 3 , 4 ,5,6,7,8
    15·2 answers
  • Consider the following method.
    14·1 answer
  • You have a filtered dataset for Customer Sales with some null value rows. You want to remove these rows completely. How will you
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!