1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mila [183]
2 years ago
14

Explain different types of port?​

Computers and Technology
1 answer:
lukranit [14]2 years ago
4 0

Answer:

.serial port

.VGA port

.Modem port

explain A port is a channel through which a device communicate with the operating system.

You might be interested in
The fill command try’s to fill or generate content for cells based on a ________.
natta225 [31]

Answer: Ctrl + R

Explanation:

Ctrl+ R is the shortcut for filling right, you will first highlight cells.

5 0
3 years ago
Signals can be transmitted in one of two ways. list and explain both
S_A_V [24]
I'm owning a give you one review trouble into the brave explain how you didn't war in the air might help you do the answer so you could go and do that
3 0
4 years ago
Which of the following is considered a period cost in absorption​ costing? A. variable manufacturing overhead costs B. fixed man
sasho [114]
Ccccccccccccccccccccc
5 0
3 years ago
A company has a custom object named Region. Each account in salesforce can only be related to one region at a time, but this rel
dezoksy [38]

Answer:

Master - detail relationship

Explanation:

Master-detail relationship is the type of relationship that appears just like parent-child relationship, Therefore, Master-detail relationship can be defined both between standard object or custom object. The detail object receives the security and sharing settings that's also given to the master object, automatically.

8 0
3 years ago
Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a
sergij07 [2.7K]

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

3 0
3 years ago
Read 2 more answers
Other questions:
  • In a newspaper advertisement for a hybrid car, which of these presentation methods would be most effective
    6·2 answers
  • Gps receivers are commonly used by individuals to determine their geographic location while hiking and to obtain driving directi
    5·1 answer
  • Write a complete program that declares an integer variable, reads a value from the keyboard into that variable, and writes to st
    11·1 answer
  • In the Dread Pirate Roberts case, U.S. Ulbricht, 31 F. Supp. 3D 54D (S.D.N.Y. 2014), one of the issues that the court addressed
    10·1 answer
  • Solid state components are less likely to fail because they:______.a. are driven by precise sets of software instructions. b. ha
    8·1 answer
  • Why is failure important when you are designing a solution to a problem?
    6·2 answers
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • What does the revolver do?
    10·1 answer
  • A Development team begins work on a new software application and decides to involve the client’s IT experts to ensure that secur
    12·1 answer
  • What is destination email address​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!