1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Deffense [45]
3 years ago
8

Using these Web sites for guidance, write a definition in your own words for five of the terms listed below.

Computers and Technology
1 answer:
Feliz [49]3 years ago
7 0

Answer:

Gigabyte: Unit of measurement, is 10^9 bytes.

Intranet: Network that is used for sharing info, and other services.

Pixel: Creates a image, it is the smallest element on a display on a device.

Modem: Converts signals produced by a computer or another type of device.

Digital: Problem solving by any capable class device.

Explanation:

Short and simple.

You might be interested in
When an isolated object becomes charged by induction, which best describes the net charge on the object?
cupoosta [38]
<span>C. The net charge does not change. 

The charge remains neutral and thus, polarization takes effect. Polarization simply means electrons and protons are separated into opposites. To best explain this, we can use a rubber balloon that has been rubbed against animal fur. Assume is has been negatively charged, bring it close to the object and make sure that these two do not touch. Electrons within the object will experience a repulsive force. 
</span>
Since repulsion will be greatest for those electrons nearest the balloon, many of them will be induced into moving away from the rubber balloon. By default, electrons are free to move from atom to atom and thus there will be a mass migration of balloons side of the object to the opposite side of the object. <span>This will leave more atoms on the rubber balloon’s side of the object with a shortage of electrons and will be positively charged and vice versa. </span>Overall, the object will become electrically neutral. 

 
5 0
3 years ago
Select the proper ergonomic keyboarding techniques.
SCORPION-xisa [38]

Answer:

The correct options are;

-Position the keyboard directly in front and close to you so you don't have an excessive reach

-Keep your shoulders, arms, hands and fingers relaxed

-Position your wrists straight or in neutral position while typing

-Adjust your chair height and position so your feet rest flat on the floor, or add a footrest to compensate for a higher chair

-Adjust the keyboard height so that your shoulders can relax and your arms are straight in front of you

Explanation:

1) It is important to keep the fingers in a relaxed position when typing

2) Ensure to type in a tapping fashion when typing rather than pressing on the keys of the keyboard

3) The fingernails should be kept short when frequent typing is done

4) The wrist is better kept above the keyboard than resting on it

5) Ensure that the mouse is easily reached.

4 0
3 years ago
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically lo
slamgirl [31]

Answer:

The answer is "Use SCP to back up the router configuration to a remote location".

Explanation:

In the SPC, it is the Secure Copy Protocol that allows information to be stored and securely transmitted. Its SCP doesn't encrypt its digital information by itself; it corresponds to both the Security module which provides authentication or security. It allows the safe transfer of personal documents from either a host machine to a remote server. Its transference protocol "FTP" is quite close, but it adds security and authentication.

4 0
3 years ago
Which display technology was developed by apple, produces vibrant colors, and supports viewing from all angles?
Vedmedyk [2.9K]
4.5K Retina display I think that is the answer you’re looking for
3 0
2 years ago
The term which refers to the attempt to gain unauthorized access to systems and computers used bya telephone company to operate
Alex787 [66]

Answer: Phreaker

Explanation:

Phreaker is defined as the unauthorized attack on  authorized communication system for stealing and manipulation phone networks.

  • Exploring,searching and identifying telecommunication field with help of technologies,equipment,tools etc is done to exploit the system and resources .
  • Other options are incorrect because phone hacking is attacking phone device, [email protected] is also hacking source and hacktivist hacks system to impact social and political field.
  • Thus, the correct option is option(d)
8 0
3 years ago
Other questions:
  • Ayuda no encuentro el concepto de estas tres preguntas: ¿para qué sirve la administración en la ofimatica o informática? ¿Que so
    13·1 answer
  • You should code width and height dimensions for images because:
    15·1 answer
  • 40 POINTS PLZ HELP NEED ASAP!!!
    5·1 answer
  • What types of input and output devices would be ideal for a college student completing his or her coursework?
    8·1 answer
  • Which of the following statements about federal student loans is true?
    7·1 answer
  • Good business ethics is a good marketing strategy. Discuss
    13·1 answer
  • If the code for JAVA is LCXC, what is the code for BASIC?
    12·1 answer
  • Which statement is true about hacking?
    11·2 answers
  • What when can you expect technology to be effective?
    12·1 answer
  • What do you think that private information like passwords, PIN numbers, will be guarded or shared with the public? Why?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!