1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andru [333]
3 years ago
12

Does downloading from mega connect someone to your computer

Computers and Technology
1 answer:
lesantik [10]3 years ago
4 0

Answer:

no

Explanation:

click on the picture to make it bigger

You might be interested in
What are the process of boots up a computer?​
Sindrei [870]

Answer:

in computer booting is the process of starting a computer it can be initiated By hardware such as button press or by a software command after it is switched on a computer central processing unit ( CPU)

3 0
3 years ago
(q004) why did the changes brought about during the industrial revolution lead to the erosion of kinship networks?
UNO [17]

As industry developed, farming and subsistence lifestyles declined, and migration forced restructuring of family units as men left to work in factories. needed to be more feminine in order to be successful wives.

<h3>What is meant by industry development?</h3>

industrial development means a development that involves a manufacturing or industrial process, and shall contain, but is not limited to, electric power production, food, and food by-product processing, paper presentation, agrichemical production, chemical processes, and storage.

<h3>Why is industrial development important?</h3>

Industrial development releases dynamic and competitive economic performance which generates income and employment, facilitate international trade and increases resource efficiency, and is thus a major driver of deprivation alleviation and shared prosperity.

To learn more about Industrial development , refer

brainly.com/question/1217301

#SPJ4

7 0
2 years ago
A security operation center (SOC) analyst investigates the propagation of a memory-resident virus across the network and notices
masya89 [10]

A type of virus that influences this circumstance in the network bandwidth is a worm.

<h3>What is Virus in technology?</h3>

In computers and technology, viruses may be characterized as a sort of malicious software, or malware, that extends between computers and provokes a deterioration of data and software either partially or completely.

The complete question is as follows:

  • A micro virus
  • a multipartite virus
  • A worm
  • a program virus.

Worms are memory-resident viruses that duplicate over the network resources. The primary consequence of this type of virus is to rapidly eradicate network bandwidth with its duplication.

This virus may also be competent to accomplish a Denial of services invasion by slamming O.S and servers.

Therefore, the correct option for this question is C, i.e. a worm.

To learn more about Computer viruses, refer to the link:

brainly.com/question/26128220

#SPJ1

5 0
2 years ago
When you right click a picture in a word processing program, which actions can you choose to perform on that image?
Juliette [100K]

1 - A

2 - B

I hope this helps!

8 0
3 years ago
A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the d
Darya [45]

Answer: ARP ( Address Resolution Protocol)

Explanation:

 The address resolution protocol is is one of the type transmission protocol that helps in determining the address of the MAC (Media access control) layer and the IPV4 address.

  • It is basically use for resolving the given IP address by using the hardware and the media access control in the network interface.
  • The main function of the ARP is that it typically used the MAC address for identifying the various types of mode in the network.
  • It is used the ARP format in the form of packet structure for transmitting the message from one place to another in the local network.    

  Therefore, the host is using the address resolution protocol for discovering the MAC address.  

3 0
3 years ago
Read 2 more answers
Other questions:
  • In a relational database design, all relationships are expressed by ________.
    10·1 answer
  • to create a cover letter to send to a potential employers along with a resume what software program should you use
    10·1 answer
  • Which one of the following items is an example of software?
    15·1 answer
  • Why is it difficult to enforce laws against intellectual theft?
    9·1 answer
  • Someone learn me more American Sign Language (ASL). Please.
    13·1 answer
  • When an object is acted on by unbalanced forces, the object will always
    11·1 answer
  • Fill in the boxes to show two ways you can find 8+6​
    8·1 answer
  • _____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment.
    8·1 answer
  • What are the different parts of a word processing program?<br><br> I need this ASAP please help!!
    6·1 answer
  • Before creating a graphic, you should _____. Select all that apply. A. export it as an SVG file B. consider whe
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!