1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatiyna
3 years ago
5

What is the name of the computer that access shared resources on the network​

Computers and Technology
2 answers:
tangare [24]3 years ago
5 0

Answer:

what is the name of the computer that access shared resources on the network

wel3 years ago
5 0

Explanation:

A server is a device or computer program that provides functionality for other devices or programs. Any computerized process that can be used or called upon by a client to share resources and distribute work is a server

You might be interested in
Although “dog.jpg” and “dog.JPG” and “Dog.jpg” and “DOG.JPG” all appear to be the same file, they are not considered the same wh
bonufazy [111]
They are not considered the same when programming web pages on the Internet, because it depends on what opereting system you're using to create web-site. Every OS use different <span>character encoding capable. You can avoid that by entering utf-8 (or smth like that) in your html file.</span>
4 0
4 years ago
The information of an management information system comes from?
Debora [2.8K]

A management information system is a computer system consisting of hardware and software that serves as the backbone of an organization's operations

5 0
2 years ago
Which of these is a consistent periodic pulse separated into equivalent intervals of time?
Art [367]
My answer would be B. beat
6 0
3 years ago
Read 2 more answers
What is the best way to determine if a cable inside a computer is a data and instruction cable or a power cable?
Liono4ka [1.6K]
You have to trace it back to its source to determine it. Data cables are flat and cables are round.
4 0
3 years ago
Question of computer sciences​
BARSIC [14]

Answer:

a ans is cyber crime

b ans is hacking

c ans is cracker

d ans is computer ethics

e ans is phishing

4 0
3 years ago
Other questions:
  • The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by ele
    7·1 answer
  • Which function of a web page relies on responsive web design
    14·1 answer
  • The database management system is a program used to create, process, and administer a database.
    8·1 answer
  • Read each scenario, and then select the best wireless device for the worker’s needs. A trucker is constantly on the road. He fre
    8·2 answers
  • Write a C or C program A6p2.c(pp) that accepts one command line argument which is an integer n between 2 and 4 inclusive. Genera
    9·1 answer
  • PLEASE ANSWER QUICK!.....I am trying to buy a computer so I can play Crysis 3 what are computers that are good for this high det
    12·1 answer
  • Given the following function definition, what modifications need to be made to the search function so that it finds all occurren
    7·1 answer
  • What are the 6 external parts of a computer system
    5·1 answer
  • What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network res
    9·1 answer
  • Given the code as follows: main() { int i = 3, n; float x; x = i; n = 8 % x; } What problem will occur? Group of answer choices
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!