1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vazorg [7]
2 years ago
10

What is it called when two or more devices connect together?.

Computers and Technology
2 answers:
fredd [130]2 years ago
6 0

Answer:

When two or more computers are connected together so they can communicate with one another, they form a network. The largest computer network in the world in the Internet.

Juliette [100K]2 years ago
3 0

Answer:

When two or more computers are connected together so they can communicate with one another, they form a network. The largest computer network in the world in the Internet.

Explanation:

You might be interested in
What is a coaxial cable?
grin007 [14]

Answer:

A transmission line that consists of a tube of electrically conducting material surrounding a central conductor held in place by insulators and that is used to transmit telegraph, telephone, television, and Internet signals.

Coax, short for coaxial, is a type of cable used to transmit data, the internet, video and voice communications. A coax cable is made up of an aluminum and copper shield with an outer plastic jacket (see below) with the dielectric insulator helping to minimize signal loss.

5 0
1 year ago
A dmz is a subnet of _____________ accessible servers placed outside the internal network.
Alborosie

A dmz is a subnet of publicly accessible servers placed outside the internal network. Any service provided to users on the public internet should be placed in the DMZ network. DMZ means demilitarized zone (perimeter network) .

7 0
3 years ago
To keep you from inadvertently moving controls as you work in the IDE, click the form or control, then click the _________ optio
Delicious77 [7]

Answer:

Lock Control

Explanation:

Lock Control can used to keep you from inadvertently moving controls while working in the IDE.You can do that by  clicking on the form and then click Lock control in format menu.

In visual studio you have to go to properties and and select Locked property and select True.So that it can be locked and you can unlock them also from here.

5 0
3 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
rodikova [14]

Answer:

The answer is "Option A".

Explanation:

A comprehensive collection of principles, guidelines, proposals, and studies on information and information systems privacy and safety are produced and carried out in the NIST publications.

  • The FIPS management standards for federal information and security laws contain various technical reporting sequences.
  • This process takes place after a plan is identified, reviews are carried out and risk analysis is performed.
8 0
3 years ago
What kind of network is built around the concept of low-power transmitters built on towers that can use the same radio frequency
marishachu [46]

Answer:

Cellular telephone network

Explanation:

Cellular telephone network utilizes the concept of the such towers that allows the use of transmitters of low power and make use of the same channel for the radio frequency.

Cellular network is the network for communication in which the end link of the network is wireless. This type type of network is distributed and makes use of the radio waves over the land areas of the network referred to as the 'cells'. These cells are served individually by the fixed base station that enables the transmission of calls over a wide range through wireless links to a fixed receiver

4 0
3 years ago
Other questions:
  • Choose the correct sequence for classifier building from the following.
    7·1 answer
  • Keeping in mind the role the order of precedence plays in equations, what would Excel display as the result of the following equ
    14·1 answer
  • What is the fastest way to locate a record for updating?
    6·1 answer
  • After a suspected identity fraud case has been resolved, you should:
    5·1 answer
  • Why do we need vram​
    6·1 answer
  • What are some effective methods for scrolling? Check all that apply.
    6·1 answer
  • A string s is a circular shift of a string t if it matches when the the characters are circularly shifted by any number of posit
    9·1 answer
  • 2. What is the name for an action performed by the VR Robot?
    7·2 answers
  • BRAINLIEST
    13·2 answers
  • What is cache memory?Mention its importance. ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!