Answer:
IP address and subnet mask.
Explanation:
The two components which are configured via software in order for a personal computer (PC) to participate in a network environment are;
I. IP address: it is an acronym for internet protocol address and can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.
In Computer networking, IP address are classified into two (2) main categories and these are; Local (internal) IP address and Global (external) IP address.
Also, the internet protocol (IP) address comprises of two (2) versions and these are; Internet protocol version 4 (IPv4) and Internet protocol version 6 (IPv6). An example of an IPv4 address is 192.168.1.0.
II. Subnet mask: this is a logical segmentation or subdivision of an internet protocol (IP) network so as to accommodate more hosts (computer systems). An example of a subnet mask is 255.255.0.0.
Answer:
face book is an interactive website, because you can interact with the content such as give a like or comment.
Answer:
General purpose graphics primitives that contain 2D graphic library as, it is used in graphics processing unit which typically manage computation for computer graphics. Graphic primitives contain basic element such as lines and curves. Modern 2D computer graphic system that operate with primitives which has lines and shapes. All the elements of graphic are formed from primitives.
Answer:
D
Hope This Helps! Have A Nice Day!!
To avoid privacy these copyright is been implemented. If copyright is not implemented software company such as Microsoft, Google cannot run the organization so that software has copyright and licenses and they protect from software privacy.
<u>Explanation:</u>
Since the world is digital world all software are available in internet for download and end user will not pay for software and use the software without purchasing from software development industries.
Even software are protected with key, hacker write the tool to brakes the key, so end user easily use these tools and generate the key and user it.
So that software company use Digital millennium copyright act, so that end user can arrested for missing the software’s.