1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sidana [21]
2 years ago
13

Every time a key is pressed on the keyboard, the _______________ chip in the keyboard notices which key has been pressed.

Computers and Technology
1 answer:
klio [65]2 years ago
7 0

Answer:enter key

Explanation:I hope this helps and please give me brainlyiest

You might be interested in
I need help on this it's not really a subject it's drivers edd
Papessa [141]

WHICH QUESTION DO U NEED HELP WITH

5 0
3 years ago
What is true of softboxes?
gizmo_the_mogwai [7]
Softboxes have an umbrella on the front. The answer to your question is A. I hope that this is the answer that you were looking for and it has helped you.
4 0
4 years ago
Read 2 more answers
Which of these factors needs to be considered when filming in HD?
mihalych1998 [28]

Answer:

I'm going to go with b but there's a 25% thats wrong.

3 0
3 years ago
You are asked to assume the role of an employee of the DigiFirm Investigation Company. As part of its community outreach effort,
kirill [66]

Answer:

1.  To trace an email we need to examine the header part of the email. By examine the header of an email we could extract the sender, subject and other important credentials related to that email.  

2. The command to trace the email id is “whois” command.

 First open the email client and find the IP address of the received email that need to be traced.  The command “whois” IP address gives the registration information of that IP address.

 3.  Reverse address/email search is the procedure used by the experts to find the origin or the ownership of the email.  Rather than tools websites are more use full in the reverse address search.

http://reverse.addresssearch.com, www.iplocation.net, etc. are good to find the ownership of an email.

4. We need to set up mail server to send, receive and to explore various activities associated with an email.  The other related purpose servers like SMTP server, HTTP server , etc are also required to assist large organizations.  The mail server can be a stand-alone computer or a collection of computer and servers.

 5.  The executable files should be examined thoroughly in the server, it can be dangerous malwares.  The examination is mainly done by scanning for malicious words and sender address.  Since many mail providers does not allow executable files to send, so the attackers are using other files also as a carrier of the malwares, so now every emails should be subject to deep examination using some malware scanner.  

6.   By the time of examination the some of the legitimate mails may also come under the suspect list so further check is needed there.  At the same time the attacks can be from legitimate sources also this could be go un-noticed; this should be also a challenge to face in the stage of e-mail examination.

8 0
3 years ago
Explain why the free market system brings efficiency as well as freedom
tangare [24]
The free market system brings efficiency and freedom because it is a system built on buying, selling, and creating. A free market system is open to the public and doesn't have such a rigid structure. It allows anyone with ideas, connections, and opportunities to create and market a potential product. This is efficient in that many people have become entrepreneurs and millionaires while still supplying a valuable product. It brings freedom because it begins with creativity and sometimes authenticity.

Please vote my answer branliest! Thanks.
5 0
3 years ago
Other questions:
  • Sarah has to pick images that display camera care. Which images would she pick to show camera care?
    11·1 answer
  • Boosting morale in a workplace through reorientation is accomplished by giving employees _____. a. snacks and drinks b. the same
    15·2 answers
  • What is the keyboard shortcut for the Undo command?
    8·1 answer
  • Identify characteristics of top-down programming design. Choose all that apply.
    13·1 answer
  • Suppose that, on average, a certain binary search algorithm takes one second to search through 1,000 items. Approximately how lo
    9·1 answer
  • Business competition is no longer limited to a particular country or even a region of the world.
    10·1 answer
  • Which type of chart or graph uses vertical bars to compare data? a Column chart b Line graph c Pie chart d Scatter chart
    14·2 answers
  • Which of the following are used to classify plutons
    14·1 answer
  • The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent messag
    12·1 answer
  • Why is experience in their own factory setting
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!