1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
3 years ago
8

Describe s computer network that you are familiar with ?

Computers and Technology
1 answer:
lbvjy [14]3 years ago
8 0

Answer:

A computer network, also referred to as a data network, is a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic.

You might be interested in
Provide all resonance structures of the sigma complex when aniline reacts with an electrophile to yield the para-substituted pro
Nadya [2.5K]

Answer:

See attached picture.

Explanation:

See attached picture for detailed explanation.

3 0
3 years ago
You want to use a terminal emulation program to terminal into a series of Cisco routers. You will be managing these devices remo
vampirchik [111]
If a terminal emulation program is used and the devices should be reotely managed, then you should use the Telnet protocol. <span>Telnet is a simple, text-based network protocol that is used for accessing remote computers over TCP/IP networks like the Internet. </span>It allows the user access<span> to a text terminal and all its </span>applications<span> such as command-line for example. </span>

7 0
3 years ago
How are authentication and authorization alike and how are they different? what is the relationship, if any, between the two\?
Helen [10]
  Both authentication and authorization are terms used in information security and <span>intelligently controlling access to </span>computer<span> resources. </span><span>Authentication is the process where by an individual’s (user's) identity is confirmed, whereas authorization is the association of that identity with rights/</span>privileges and permissions to resources related to information security.

3 0
3 years ago
Read 2 more answers
1.2.10 Snowflakes CodeHS<br> Does anyone have the code for this?<br> Thank you!
tresset_1 [31]

Answer:

idrk tbh

Explanation:mhmmmmmmmmmmmmmmmmmmmmm

8 0
3 years ago
Your boss it trying to console into an old switch that he found in storage and wants to configure it. he asks you to describe wh
nika2105 [10]
I believe that the correct answer is c. look for a male connector with 9 pins.
5 0
3 years ago
Read 2 more answers
Other questions:
  • A personal computer uses a number of chips mounted on a circuit board called microprocessor. system board. daughter board. mothe
    8·1 answer
  • __ means having a current knowledge and understanding of computers, mobile devices, the web, and related technologies.
    8·1 answer
  • When writing potential test questions, it is very important to use vocabulary words in their correct form. Please select the bes
    11·2 answers
  • Explain the nature of documents that can be suitable for mergin
    12·1 answer
  • (Palindrome integer) Write the methods with the following headers // Return the reversal of an integer, i.e., reverse(456) retur
    9·1 answer
  • A powerful computer that acts as a hub for other computers is a called a ______.
    6·2 answers
  • The marketplace is the essence of which of the following?
    11·1 answer
  • The image below shows a weather service map
    13·1 answer
  • Last bittttt of points
    8·1 answer
  • Who Likes K-pop? Which group or groups do you like
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!