1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew-mc [135]
2 years ago
10

45 points!

Computers and Technology
2 answers:
scoundrel [369]2 years ago
7 0

FTP refers to the process of transferring files from your computer to a server.

(sorry I don't know the second 1

wel2 years ago
4 0
  • <u>Uploading</u> refers to the process of transferring files from your computer to a server.
  • <u>s</u><u>y</u><u>n</u><u>c</u><u>h</u><u>r</u><u>o</u><u>n</u><u>i</u><u>z</u><u>i</u><u>n</u><u>g</u> refers to the process of transferring files from the server to the client.

Explanation:

FTP stands for File transferring portal.

You might be interested in
What is the problem, if any, with the following code?The desired output is [3,19].
vfiekz [6]

Answer: You need a temporary variable to hold the value 3

Explanation:

So, aList[0] is 3 and aList[1] is 19, if it will be as it is you litteraly say to the compiler to change aList[0] to aList[1]  at this moment aList[0] is 19 and aList[1] also is 19 and if you try to change aList[1] to aList[0]  it will not change its value because they are the same.

You need temp variable to keep one of the values.

8 0
2 years ago
__________ is a contemporary term for data and software tools for organizing, analyzing, and providing access to data to help ma
klemol [59]

Answer:

Business Intelligence .

Explanation:

Business intelligence is a type of technology that is used by enterprises for the analysis of the data about the information of the business intelligence converted the usefulness data into its corresponding  information which is meaningful.

The main function of the business intelligence for organizing the data, analyzing the data, and providing access data to the manager as well as for the other enterprise for the decision making activity.

6 0
2 years ago
Which of the following software monitors a user's activities and sends the information back to another source without the user k
sdas [7]

Answer:

Malware

Explanation:

Some of the examples of Malware are Spyware, Viruses, Adware, Fake security software and Browser hijacking software. And these are a piece of codes, and if this is successfully installed on any computer, it spies through the user's activity, and without any consent of the users, sends all those personal and various other very sensitive data like credit card related information to the hacker. and who then take control of all your activities, and can threaten you, and ask for money to let you go free. Hence, always be clear to operate with only trusted parties.

5 0
3 years ago
A small company connects data acquisition equipment to the serial port of a computer. The equipment user has reported that not a
Setler79 [48]

Answer: Loop-back plug

Explanation: Loop-back plug is the device that is used for the attaching the computer system so that loop-back test can be carried out. Data transmission's integrity is examined with the help of loop-back test.

The procedure is carried out by sending a signal by a circuit and then receiving the signal back to the sending device .This states about the uprightness of the signal.

As per the situation mentioned in the question, loop-back plug should be used by technician to check the issue by connecting the computer with the equipment.

8 0
3 years ago
Ms. Myers commented that _____ she slept in at the hotel was better than _____ she slept in at home.
nirvana33 [79]
The bed/ the bed is the answer
6 0
3 years ago
Other questions:
  • Into which of these files would you paste copied information to create an integrated document?
    13·2 answers
  • A smart refrigerator can use what to detect when you are running low on milk, and then send a reminder to you on a wireless.
    8·1 answer
  • Which feature is an interface between the user and the file system of a computer?
    6·2 answers
  • Which of the following software program provides for email communication
    13·2 answers
  • What are the pasting options in Outlook 2016? Check all that apply.
    10·2 answers
  • Consider a Games Expo for Children. Six competitions are laid out for the expo. Tickets are sold according to the age and gender
    11·1 answer
  • You want to securely erase data from your hard drive what can you use to do this and what is the process called
    12·2 answers
  • 2 ways to make your computer work faster ( please help asap )
    6·1 answer
  • Create a set of functions that compute the mean, median, and mode of a set of
    8·2 answers
  • Assuming a 32bit processor If I have a double pointer defined as dPtr and I add 1 to it. How many bytes are added to the address
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!