1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rufina [12.5K]
3 years ago
8

Pls help points and mark brainliest computer science

Computers and Technology
1 answer:
KiRa [710]3 years ago
4 0

Answer:

The answer is MAC address.

Explanation:

I'm a tech kid so I love this stuff!!!

Hope this helps! Have a great day! =)

You might be interested in
I used the Pearson correlation coefficient for my study to test the correlation and how strong is the relationship between two v
slamgirl [31]

Answer: NO

Explanation:

6 0
3 years ago
Read 2 more answers
In addition to analyzing logic and program code, a project team usually holds a session with users, called a ____ walkthrough, t
Nikolay [14]

Answer: B) design

Explanation:

  • Design walk-through is the method done while designing codes through which assurance regarding validity and accuracy of design is evaluated.
  • Reviewing of codes design ,content ,GUI(Graphical user interface) design and production processing components are done at this stage.This steps gives the surety about all the decision and features are correct and quality is maintained.
  • Other options are incorrect because unit walk-through is reviewing the complete unit or system.Testing walk-through and user walk-through are not the technical term of engineering field.
  • Thus, the correct option is option(B).
8 0
3 years ago
A firm uses BitLocker for volume encryption. Normally, BitLocker performs its task well. However, an administrator was recently
raketka [301]

Answer:

The BitLocker keys were compromised

Explanation:

Given that the act of decrypting and encrypting all over is a means of troubleshooting the issue of security in computing operations. Hence, when an administrator is forced to decrypt and encrypt the entire volume, the main reason for such action can be as a result of "BitLocker keys were compromised."

Hence, the right answer, in this case, is that "The BitLocker keys were compromised."

3 0
3 years ago
Why internet is helpful for ICT?​
insens350 [35]

Explanation:

Information & Communication Technology is an extended term for Information Technology. That stresses the role of unified communication & integration of telecommunications & computers as well as enterprise software, middleware, storage & audiovisual, that enables users to access, store, transmit & manipulate information. The term ICT is used to refer to the convergence of audio-visual & telephone networks with computer networks through single cabelling or link systems.

All the things that are happening nowadays are with the help of the Internet. From shopping, meetings, messaging, video conferencing, news and many more are happening just in single touch within a fraction of seconds you will know what's happening in the corner of the world, around the world, beyond the planet, you can communicate with anyone you want, you can purchase from where ever you want. This Internet has made this huge world like a small apple.

4 0
3 years ago
What is six data type used in MS Access ​
Alika [10]
Alphanumeric data, date/time, Numeric data, Currency, Lookup Wizard, Attachment.

4 0
3 years ago
Other questions:
  • Suppose two hosts, A and B, are separated by 15,000 kilometers and are connected by a direct link of R = 5 Mbps. Suppose the pro
    11·1 answer
  • Does anyone know the code for codeHS 5.4.7 teenagers?
    8·1 answer
  • The idea behind ____ is that the peripheral can simply be plugged in and turned on, and that the computer should dynamically rec
    10·1 answer
  • ______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
    12·2 answers
  • Which of the following SNSs has been associated with art work display?
    14·2 answers
  • Is a house phone a computer?<br> And why??
    14·2 answers
  • How to get the home button on your screen?
    13·1 answer
  • Rosa has received reports by several users that one of the Linux servers is no longer accessible. She is able to remote into the
    10·1 answer
  • How does computer science play a role in art?
    6·1 answer
  • What are the 2 levels of formatting in a word document
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!