1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
3 years ago
14

Explain what are Graphics Cards

Computers and Technology
1 answer:
julia-pushkina [17]3 years ago
6 0

Answer:

Graphic Cards are designated to make the pc have more FPS and actually power (It's not actually accurated, but you may search on the internet)

You might be interested in
If the ____________ is broken on a laptop, chances are other parts are also broken.
ella [17]
Central processing Unit
8 0
3 years ago
Which of the following is a good technique to use when driving in an urban environment
nadya68 [22]

Answer:

A. Passing

Explanation:

Passing is a good technique to use when driving in an urban environment .

5 0
3 years ago
Read 2 more answers
Game design colleges anyone know the requirements??
tester [92]
Basic understanding of code language such as Java, C++, Swift (iOS) etc. without knowledge of these, you’ll be lost trust me. Study up on these in your spare time. They do teach this stuff in college, but being ahead of the game is always good. No pun intended kek ;D
8 0
3 years ago
TCP connections are established through sequence numbers. Someone can guess a client's next sequence number and then impersonate
solong [7]

Options: True or false

Answer: True

Explanation:TCP(TRANSMISSION CONTROL PROTOCOL) is is an internet control protocol that allows Communication between internet users or computers by collecting and compiling packets of data and then sending such collected packets of data to the desired user.

Before using a TCP one must first create a connection which will enable it to effectively communicate with the other user.

TCP are established using sequence numbers which can be predicted by another party for their own personal gain.

6 0
3 years ago
What is not an advantage of a computer network?
Nutka1998 [239]

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

4 0
4 years ago
Other questions:
  • According to many experts how often should files be backed up
    12·1 answer
  • What conversion factor should be used to convert from meters to Gigameters?
    9·1 answer
  • Add a checkbox associated with each label. The first checkbox should have name and id of "likeCats" and be initially checked. Th
    5·1 answer
  • Monica is teaching herself to paint. What web resource would be the most helpful
    14·1 answer
  • Proper __ management is essenciales for meeting project deadlines​
    11·1 answer
  • A bug collector collects bugs every day for seven days. Write a program in Python that finds the highest number of bugs collecte
    11·1 answer
  • The Hazard Communication Standard, commonly called the “Right-to-Know” law, gives you the right to know what information?
    6·2 answers
  • Web Services: a. Is a hardware application b. Is a software application c. Is an enterprise system d. Is a single database
    11·1 answer
  • Impact of computer in society, using relevant examples​
    13·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!