1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew11 [14]
3 years ago
12

ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!

Computers and Technology
2 answers:
ra1l [238]3 years ago
6 0

Answer:

1 c

2 a

3 c

4 b

5 c

6 b

7 d

8 a

9 d

10 b

saveliy_v [14]3 years ago
3 0

Easy Peasy Lemon Squeezy

1. A means of giving credit to a source when their information is used.

A.) Citation

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.

B.) Phishing

3. A device that translates analog carrier signals to encode and decode digital information.

D.) Modem

4. A virus or Trojan horse designed to cause harm to computer or device

B.) Malware

5. Software that is used to detect and eliminate computer viruses.

C.) Antivirus Application

6. Transmits data through a cable television network as a means to connect a computer to the internet.

B.) Cable Internet

7. An application used to access websites on the internet.

D.) Browser

8. Communication that does not happen in real time.

A.) Asynchronous Communication

9. A network of computers that provides access to information on the web.

B.) Internet

10. The cable used to connect computers in a network.

B) Ethernet Cable

You might be interested in
What is your favorite photograph in the presentation? Why?
topjm [15]

Answer:

is there a presentation in your lesson maybe?

Explanation:

6 0
3 years ago
What are the careers needed to create a video game? Name all the careers involved please.
AURORKA [14]
Audio Engineers
Interpreters and Translators
Video Game Testers
Technical Support Specialists
Marketing Managers
Market Research Analysts
Sales Representatives

6 0
4 years ago
. Suppose: x = (1111 1111 1111 1111 1111 1111 1111 1100)2 y = (0011 1011 1001 1010 1000 1010 0000 0000)2 a. Is x bigger than y i
ahrayia [7]

Answer:

a. Using 32bit unsigned binary system, x is bigger than y

b. Using 32 bit signed system, x is not bigger than y.

Explanation:

a.

x = (1111 1111 1111 1111 1111 1111 1111 1100)2

y = (0011 1011 1001 1010 1000 1010 0000 0000)2

In an unsigned system all binary digits are used up as the magnitude bits;

First, we need to convert each number to decimal

x = 4294967292 (decimal)

y = 999983616 (decimal)

4294967292 is greater than 999983616

So, x is greater than y (in 32 bit unsigned binary system)

b.

x = (1111 1111 1111 1111 1111 1111 1111 1100)2

y = (0011 1011 1001 1010 1000 1010 0000 0000)2

In a signed system, the most significant bit is used as the signed bit, the remaining bits are used in representing the magnitude bits;

The most significant bit is always the first bit.

0 represents positive (+)

While

1 represents negative (-)

First we need to separate the most significant bit from the magnitude bits.

So x = 1 (111 1111 1111 1111 1111 1111 1111 1100)2

And y = 0 (011 1011 1001 1010 1000 1010 0000 0000)2

Then, we need to convert each number to decimal

x = -2147483644

y = +999983616

From the above, y is greater than x

4 0
3 years ago
How many nibbles are in 18 bytes??
IgorC [24]
36 Nibbles are in 18bytes.
7 0
4 years ago
________ was the communication medium of choice for early computer criminals.
vladimir1956 [14]
I would say that morse code would be the answer, but im not sure if that would apply to  computers
5 0
4 years ago
Other questions:
  • A .jpg file is an example of which of the following file types
    15·2 answers
  • If a cheetah covers 155 meters in 5 seconds, at what speed is the cheetah running?
    14·2 answers
  • A new protocol for new information distribution proposed by CERN became the world wide wed in 1991.
    10·1 answer
  • How does an ALU perform logical operations?
    6·1 answer
  • Write the definition of a function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    10·1 answer
  • Ted is looking for a reliable source for his paper. Which of the following sites would be considered reliable?
    5·1 answer
  • Write a for loop to print all NUM_VALS elements of vector courseGrades, following each element with a space (including the last)
    11·1 answer
  • Visme,PowerPoint, keynote and prezi are what kind of software
    15·1 answer
  • Is a way og saving a file so it can be used by a different program​
    11·1 answer
  • In attempts to improve their contribution to the environment a company decides to adapt green computing. Which of these techniqu
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!