1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew11 [14]
3 years ago
12

ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!

Computers and Technology
2 answers:
ra1l [238]3 years ago
6 0

Answer:

1 c

2 a

3 c

4 b

5 c

6 b

7 d

8 a

9 d

10 b

saveliy_v [14]3 years ago
3 0

Easy Peasy Lemon Squeezy

1. A means of giving credit to a source when their information is used.

A.) Citation

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.

B.) Phishing

3. A device that translates analog carrier signals to encode and decode digital information.

D.) Modem

4. A virus or Trojan horse designed to cause harm to computer or device

B.) Malware

5. Software that is used to detect and eliminate computer viruses.

C.) Antivirus Application

6. Transmits data through a cable television network as a means to connect a computer to the internet.

B.) Cable Internet

7. An application used to access websites on the internet.

D.) Browser

8. Communication that does not happen in real time.

A.) Asynchronous Communication

9. A network of computers that provides access to information on the web.

B.) Internet

10. The cable used to connect computers in a network.

B) Ethernet Cable

You might be interested in
Taken together, the physical and data link layers are called the ____________________. Internet layer Hardware layer Internetwor
IrinaK [193]

Answer:

Hardware layer

Explanation:

The hardware layer's job is to maintain and put to action central processor units and memory. Hardware layer first check the availability of the for mentioned duo and then decides the need to put one or another into action. Physical and data link layers act the same in the hardware layer. They bot are waiting to be called in action

6 0
3 years ago
A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of ba
melomori [17]

Answer:

The given statement is "True".

Explanation:

  • Software property ownership seems to be computer programs or law-protected software whether, under a licensing, company name, proprietary information, or software commercialization.
  • Collaborate, and operate for a deeper understanding or analysis of the important technological processes and trade-offs throughout collaborative consumption developing future as well as integrated frameworks.

7 0
3 years ago
Ryan needs to see the space available to insert content on a slide in his presentation. Which feature of a presentation program
Sav [38]

The feature that Ryan should take advantage is Layout, which is available in his presentation, to insert the content he wants, be it a graph, picture, paragraph, bullet points, video, etc. Assuming this is a Microsoft PowerPoint, Ryan can right-click the slide he wants to put the content in, where an option window would appear. He should click on the ‘Layout’ option and several types of layouts available for him to put content on would appear: Title & Content, Two Content, Comparison, and Content with Caption.

3 0
3 years ago
Select the correct answer
adoni [48]
As a visually disabled person my self (if you want to check it out I have something called Aniridia) I love when websites have tabs easy to identify each category of the website. Additionally, when websites have clear bold titles and not to many words close together (it really do be putting strain on ones eye when that happens so having separated paragraphs is awesome if the website has words) but other than that it’s all I could think of from my POV. Hope this helps you :)
6 0
3 years ago
Read 2 more answers
An Administrator is preparing to deploy change set into the production environment. Until the deployment is complete, only user
ivann1987 [24]

Answer:

Assign all other users a custom profile with reading access to all objects revoked and add a custom homepage message

Explanation:

Until the deployment is complete, no user other than the user with System administrator profile should be allowed to access data in the production system.

In such a case, the administrator can assign all other users a custom profile with reading access to all objects revoked and add a custom homepage message.

8 0
4 years ago
Other questions:
  • Which of the following statements are true with regards to satellite internet access
    15·2 answers
  • What is basic function of an operating system?
    10·2 answers
  • A ______ controls how computer hardware communicates with the operating system
    9·1 answer
  • Thomas is using a drawing program to complete a construction. Which construction could he be completing? (5 points).
    5·2 answers
  • Bit rate is a measure of how many bits of data are transmitted per second. Compared to videos with a higher bit rate, the same v
    13·1 answer
  • А.<br> is the highest education degree available at a community college.
    6·1 answer
  • A user complains because the social media apps on his mobile device always note his location. The user is worried about privacy,
    14·1 answer
  • Could you please check my answers to this layout user defined data types
    15·1 answer
  • You are adding more features to a linear regression model and hope they will improve your model. If you add an important feature
    7·1 answer
  • Which of these is true about moores law
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!