1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
7

Which of the following are pointers? Select all that are correct. hub node router transmission media switch port interconnector

Computers and Technology
2 answers:
Gnoma [55]3 years ago
8 0
Hub, router, switch I had the same question in Career Prep. and theses were the answers. Hope I helped
Sphinxa [80]3 years ago
4 0
Hub , switch port , transmission media , hope I helped
You might be interested in
When a user utilizes another computer to communicate with a third party, with the result that the third party cannot recognize t
avanturin [10]

Answer:

Online or Web Proxy

Explanation:

Web or online proxy allows you to hide your Internet Protocol (IP) address from the website you are trying to visit or access. It is like a shield between the website you are accessing and you. They can be seen as a middleman between you and the site you are visiting and as such, the site sees that a specific IP address is accessing its server but the address is not yours as all requests between your computer and the web server are first passed through the proxy server.

<em>Hope this helps!</em>

4 0
3 years ago
Web-based application software is software that ________.
d1i1m1o1n [39]
Web-based application - this is a special kind of applications that operate in the global Internet via HTTP. The user interacts with the program, usually carried out through the browser.
8 0
3 years ago
The this reference . a) can be used implicitly b) must be used implicitly c) must not be used implicitly d) must not be used 25)
Gnom [1K]

Answer:

yeet

Explanation:

because computers

6 0
3 years ago
You were discussing software piracy with a friend and were surprised to learn how software piracy can impact your life every day
Vika [28.1K]
Those who use pirate software:
<span>1)Increase the chances that the software will not function correctly or will fail completely
2)Forfeit access to customer support, upgrades, technical documentation, training, and bug fixes
3)Have no warranty to protect themselves
4)Increase their risk of exposure to a debilitating virus that can destroy valuable data
5)May find that the software is actually an outdated version, a beta (test) version, or a nonfunctioning copy
6)Are subject to significant fines for copyright infringement</span>
5 0
4 years ago
Which of the following is not an operating system
mrs_skeptik [129]

Answer:

C

Explanation:

I hope this helped.

3 0
4 years ago
Read 2 more answers
Other questions:
  • Again, consider what you believe to be the goal of performing a penetration test. Why would you worry about doing any privilege
    14·1 answer
  • To select a number format, you can choose a category in the Number tab in the Format Cells dialog box and then select the number
    5·1 answer
  • If you work up to your potential but fall short of your goals, you
    15·2 answers
  • 2. Which of the following best describes the protocols used on the Internet?
    15·1 answer
  • Under what circumstances are composite primary keys appropriate?
    5·1 answer
  • What is the purpose of the Excel Function Reference?
    9·1 answer
  • When you press the ____ key without entering any text after the automatic bullet character, Word turns off the automatic bullets
    11·1 answer
  • Https://www.blooket.com/play?id=300932<br> please
    8·2 answers
  • How do you remove management from your chrome book [administrator]
    12·1 answer
  • A form of segmentation that is based on user usage rate, user status, purchase occasion, and benefits sought is _________.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!