1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PSYCHO15rus [73]
3 years ago
5

Differentiate between standard and enhanced keyboard(10 diffrences)​

Computers and Technology
1 answer:
sammy [17]3 years ago
5 0

Explanation:

by which green plants and some other organisms use sunlight to synthesize nutrients from carbon dioxide and water. Photosynthesis in plants generally involves the green pigment chlorophyll and generates oxygen as a by-product.

You might be interested in
You are a desktop administrator for Nutex Corporation. A user reports that he is unable to access network resources. You notice
Tju [1.3M]

Answer:

The right answer is wire crimper tool.

Explanation:

According to the scenario, the most appropriate answer is the wire crimping tool because the wire crimping tool is a tool that can strip the wire then cut it in proper shape and then crimp the wire in the RJ45 connector very effectively.

RJ45 connector is a connector which is used in ethernet cables to connect to computers i.e. cat 5, cat 5e, cat 6, etc. these cable has 4 pairs of different color codes.

A wire crimper effectively connects the end of the cable to an RJ45 connector.

4 0
3 years ago
_____ is a protocol used by e-mail clients to download e-mails to your computer.
navik [9.2K]
Smtp : Simple Mail Transfer Protocol
3 0
4 years ago
_____________is the act of protecting information and the systems that store and process it.A.Information systems securityB.Poli
mylen [45]

Answer:

A. Information System Security (ISS)

Explanation:

Information System security is a very important security in any organization.

The main focus of Information system security is the system itself and the information that the system possesses, processes and stores.

Information system security, or infosec for short, is the modality involved in protecting information and in making it available.

With Infosec,

1. an organization's ability to perform is protected

2. the data an organization uses is protected ensuring integrity

3. programs, applications and technology implemented on an organization's systems are safely used.

Hope this helps!

3 0
3 years ago
Read 2 more answers
How to build aeroplain pls tell me I want to go to amereeca
damaskus [11]

Answer:

lol i think it would be cheaper to but a ticket or drive there

8 0
3 years ago
Hiding an object, such as a diary, to prevent others from finding it is an example of:______________.
madreJ [45]

Answer:

Privacy

Explanation:

I'm not sure but it matches the description you gave.

4 0
3 years ago
Other questions:
  • ________ is a method for addressing, creating, updating, or querying relational databases.
    9·1 answer
  • The domain in an email message tells you the
    5·1 answer
  • Hello, can you help me answer these questions?
    9·2 answers
  • Apache web server is the most widely used network operating system used on web servers.
    8·2 answers
  • By Carl Sandburg
    6·1 answer
  • Consider the most important item among all the categories of information stored on your personal computer. As it applies to that
    8·1 answer
  • A benefit of flashcards is that they are
    7·2 answers
  • Mike recently started using Google Display Ads to create a more automated approach to managing his campaigns. What's one automat
    10·1 answer
  • In 1964 in London, Ontario one could buy a chili-dog and a root beer for $1.25, today the same chili dog and root beer cost $5.0
    8·1 answer
  • How do you create a formula in excel​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!