1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DanielleElmas [232]
2 years ago
7

Who go to Tennessee Connection Academy And If yall Do plz comment down below.

Computers and Technology
1 answer:
zalisa [80]2 years ago
7 0

Answer:

it a or d

Explanation:

You might be interested in
Two fingers are assigned to six letters each. What fingers are they?
Lena [83]

Answer:

The left and right index finger

Explanation:

Left index finger: R, T, F, G, C, V

Right index finger: Y, U, H, J, B, N

8 0
3 years ago
Which of the following is used to store data in the computer's memory that can be
sasho [114]

The  storage that is used to store data in the computer's memory that can be used by a program later when executing instructions is variables.

<h3>What is variables?</h3>

Variables can be defined as the way or process in which data or information are store in a computer memory.

Data or information that may likely change or be altered are often stores in a computer memory storage called variables and this store data can be retrieve later for use by a program when executing instruction on the computer  system.

Inconclusion the  storage that is used to store data in the computer's memory that can be used by a program later when executing instructions is variables.

Learn more about variables here:brainly.com/question/23931018

5 0
1 year ago
charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes a
finlep [7]

Charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes and repairs security issues found. The kind of scanning that best describes Charles's requirements is: Active scanning.

<h3>Who is a Security Analyst?</h3>

A Security Analyst's responsibilities include the following:

Define, plan, execute, maintain, and improve security measures, policies, and controls. Writing reports and offering insights on the effectiveness of current security policies, incident response plans, disaster recovery plans, and other security-related information

Active scanning is a scanning approach that involves scanning individual endpoints in an IT network in order to retrieve more specific information.

Learn more about Security Analysts:
brainly.com/question/16354463
#SPJ1

6 0
1 year ago
State three differences between a hard drive and a pen drive​
ExtremeBDS [4]

Answer:

A hard drive is what on your computer stores the operating system and all of the files you download. A pen drive (USB DRIVE) is a portable drive used for storing files that you can plug into computers with usb drive ports and transfer that data over to the computer through the USB Drive and you can also copy data onto the USB Drive from a computer and transfer it to other computers.

Explanation:

Computer Technician

7 0
3 years ago
Edhesive 11.1 lesson practice please
zloy xaker [14]

Answer:

1. Bits

2. Bitrate

3. The amount of time it takes for bits to travel from one place to another.

4. Used to send bits wirelessly.

5. Cables that carry light and dramatically increase the speed and accuracy of information over the internet.

6. 8

7. The number of bits per second a system can transmit.

Explanation:

hey lol

3 0
2 years ago
Other questions:
  • Programming assignment (100 pts): In the C++ programming language write a program capable of playing Tic-Tac-Toe against the use
    14·1 answer
  • What is a relationship between a object and a class?
    7·1 answer
  • Opportunities in nanotechnology apply broadly to many fields. Identify TWO areas of IT that may be impacted by its further devel
    6·1 answer
  • Mac or PC (need opinions please)<br><br> Why did you choose Mac/PC?
    10·2 answers
  • What feature is available to add a suggestion in the margin of someone else's document?​
    15·1 answer
  • In 1980, IBM's cheapest computer was more affordable than Apple's.<br><br><br> True<br><br> False
    10·1 answer
  • How is the pattern matching done in the SQL?
    5·2 answers
  • Instructions
    13·1 answer
  • Aisha designed a web site for her school FBLA club and tested it to see how well it would resize on different systems and device
    5·1 answer
  • as a pc technician, you are on the road most of the day and use a laptop. when you get back to your office at the end of the day
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!