1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tasya [4]
2 years ago
8

MCQ: A computer network is interconnection of two or more:

Computers and Technology
1 answer:
timama [110]2 years ago
4 0

Answer:

computers

Explanation:

it is because other remaining are not able to access network

You might be interested in
A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
victus00 [196]

Answer: (D) Distributed denial- of- service (DDoS)

Explanation:

The distributed denial of service attack is one of the type of attack that occur when the multiple system are basically flooded with the resources and the bandwidth.

  • Botnet is one of the example of DDoS as it caused the DOS (denial of service) for the users.
  • This type of attack is more substantial as compared to the DoS attack as they use the multiple system for attack the single target simultaneously.

Therefore, Option (D) is correct.

8 0
3 years ago
explain the joke, “There are 10 types of people in the world: those who understand binary and those who don’t.”
tino4ka555 [31]

Answer:

Binary is made up of only 2 digits: a one and a zero. 1011 is eleven in our counting system.

So 10 in binary = 2 in our counting system.

Read the joke as follows. There are 2 types of people in the world: those who  understand binary and those who do not.

I guess it's not really that funny, but computer programmers like it.

6 0
11 months ago
Window is a very popular operating system becouse of its _ environment .​
Inga [223]
Window is a vary popular operating system because of its runtime and compatible environment .
hope it help
4 0
2 years ago
Read 2 more answers
What could prevent ping or traceroute responses from reaching the originating device beside network connectivity issues?
zysi [14]
Many admins set their firewalls to drop echo-request packets to prevent their networks from being mapped via "Ping Sweeps".

A remote possibility is that there's too many hops between the source and target and the packet's TTL expires.
3 0
3 years ago
Enumeration can be used to discover all but which of the following types of information?
Ostrovityanka [42]

Answer:A)Smart-card PINs

Explanation: A pin is the defines as the personal identification number that is allotted to the smart card uniquely that is no other smart can have same number.This number is only known by the smart card holder only.

This number is important because it works for the unlocking of the data that is securely stored and by entering the pin ,it can be decoded.Thus, the other given options are incorrect because they don't use enumeration to hide the data .Thus the correct option is option (A)

3 0
3 years ago
Other questions:
  • Identify the correct XHTML syntax for inserting an image as a hyperlink from the options provided. A. book.gif B. C. D.
    9·1 answer
  • In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
    10·1 answer
  • What is html?
    9·2 answers
  • Which topology enables only one person, at one time, to send data to others on the network?
    6·1 answer
  • Write the method public static doublell quizAverages (double (1 scores). which takes a 2D array of doubles that represent quiz s
    11·1 answer
  • Please refer to the MIPS solution in the question above. How many total instructions are executed during the running of this cod
    10·2 answers
  • Special effects are added using the _____.
    16·1 answer
  • Using PowerPoint or Impressed guarantees that your presentation will do which of the following?
    6·1 answer
  • Help giving points mark BRAINLEST
    5·1 answer
  • What what do these two parts of the lift do ​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!