An advantage of a network is
You can get hacked
You can share peripherals
You need to remember your password
All of the mentioned

1 Answer

Answer :

You can share peripherals

Related questions

Description : I need to know what is zaigamingxxx password in roblox he hacked me I wanna get revenge?

Last Answer : search up his username

Description : In a star network each node (file server, workstations and peripherals) is connected to a central device called a _____: a) Bug b) Center c) Hub d) None of These

Last Answer : c) Hub

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : Which of the following routing algorithms can be used for network layer design? a. shortest path algorithm b. distance vector routing c. link state routing d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Windows 7 asks for network password when trying to share a folder.

Last Answer : answer:“I didn’t set one” Try setting a PW on the master entrance, then try what you are doing again.

Description : Can someone tell me the negative aspects of owning an iPhone that has been hacked to any network?

Last Answer : Visual voice mail is provided by the carrier so if you are not using AT&T (or who ever) you won’t get visual voice mail.

Description : What type of network device allows youto share your connection to the Internet with other computers in your home? A) Ethernet card B) NIC C) Router D) Cat 5

Last Answer : Router

Description : Which statement is true regarding the user exec and privileged exec mode? A. They both require the enable password B. User exec is a subset of the privileged exec C. The '?' only works in Privileged exec D. They are identica

Last Answer : User exec is a subset of the privileged exec

Description : Why doesn't Mac peripherals connect to wifi?

Last Answer : Similar problem with my MBP OS X 10.6. I have less of a problem now that I moved to OS X 10.7. I think it was crabby about the Cisco router we have for my wife, she works from home sometimes ... Cisco ! ). My older D-link never is a problem. Don't know what to say about the other Apple products.

Description : What are the requirements of computer peripherals ?

Last Answer : Requirements of computer peripherals 1. Input / output peripherals are required to perform computer functions smoothly. 2. Input / output peripherals are required to communicate between computer components. ... . Output input / output peripherals are required to display the results on the computer.

Description : What is the classification of computer peripherals ?

Last Answer : Classification of computer peripherals Computer peripherals can be divided into three categories based on their function. Namely: 1. Receiving equipment or input device ( Input Device) 2. Exhaust mouth equipment or output device ( Output Device) 3. Storage Device or Storage Device

Description : What are computer peripherals ?

Last Answer : Peripheral is an additional device attached to a computer that is used for a specific purpose. Peripherals provide data and instructions to a computer, retrieve results from a computer, and store results. Such as - printer , plotter disk , disk drive , CD-ROM etc.

Description : Hello, I would like to buy a new mouse and keyboard, overall it should cost me up to 2 thousand crowns, but it could be less. I want the mouse and keyboard to be well backlit and to have more colors to choose from, they should also work well. Thank you in advance for your reply.

Last Answer : Need Answer

Description : Why peripherals are not connected directly to the system bus?

Last Answer : One of the major reasons is the peripherals' cabling would puttoo much capacitive loading on the system bus, either slowing itsoperation by orders of magnitude or making it impossible to operateat all!

Description : The code for a Web page is written using _____ 1) A fifth generation language 2) Win Zip 3) Peripherals 4) Hypertext Markup Language 5) URL

Last Answer : Answer :4

Description : Transformation of input into output is performed by? 1) Peripherals 2) Memory 3) Storage 4) The Input-Output unit 5) The CPU

Last Answer : Answer :5

Description : Information travels between components on the mother board 1 through1) Flash memory 2) CMOS 3)Bays 4) Buses 5) Peripherals

Last Answer : Answer :4

Description : The computer or system peripherals that receives data from processing unit are called ___________ A. Input Devices B. Output Devices C. Both (A) and (B) D. None of the Above

Last Answer : B. Output Devices

Description : External devices such as printers, keyboards and modems are known as _________ A. Special Buys B. Add on Devices C. Peripherals D. All of the above

Last Answer : C. Peripherals

Description : The communication line between CPU memory and Peripherals is called a _________ (A) Registers (B) Mother Board (C) Bus (D) None of the Above

Last Answer : (C) Bus

Description : Which unit acts as the brain of the computer which control other peripherals and interfaces: a. Memory unit b. Cache unit c. Timing and control unit d. None of these

Last Answer : c. Timing and control unit

Description : Which of the following is correct regarding Bus Topology: a) All nodes (file server, workstations and peripherals) are connected to the linear cable. b) Popular on LANs because that are inexpensive and easy to ... main run of cable with a terminator at each end. d) All of Above e) None of These

Last Answer : d) All of Above

Description : Macromedia is a name of a company related with ---- 1) Hardware 2) Software 3) Peripherals 4) Services

Last Answer : 2) Software

Description : The Grummond Group buys computer peripherals in industrialised countries and sells them to developing countries. Grummond would most likely be classified as a A)trading company. B)strategic alliance. C)joint venture. D)licensee. E)subsidiary.

Last Answer : A)trading company.

Description : The ‘brain’ of a computer which keeps peripherals under its control is called: (A) Common Power Unit (B) Common Processing Unit (C) Central Power Unit (D) Central Processing Unit

Last Answer : (D) Central Processing Unit

Description : Which of the following peripherals provide I/O facilities? i. 8279 ii. 8155 iii. 8259 iv. 8255 (A) i, ii (B) ii, iii (C) iii, iv (D) ii, iv

Last Answer : Which of the following peripherals provide I/O facilities? i. 8279 ii. 8155 iii. 8259 iv. 8255 (A) i, ii (B) ii, iii (C) iii, iv (D) ii, iv

Description : I cant remember my password how do i find it.

Last Answer : Right under the ‘Log In’ box, there’s a link: Forgot info? Click on that, and it’ll direct you further. If you still have problems after that, hit the ‘Contact’ button at the top of the page and send us an email. We’ll be happy to help you!

Description : I have the user name for an old Photobucket account, but, I don't remember the password. The email that I used for that account is long gone; is there any way that I could into that account?

Last Answer : Write to technical support and ask them how to identify yourself properly so that you can gain access.

Description : How do I find my PPPoE login and password if I dont remember it?

Last Answer : Perhaps you should contact geeksquad?

Description : How do I get firefox to remember my password that doesn't have a "Remember Me" option ?

Last Answer : I use a Sxipper addon for this very purpose. It remembers all your usernames/passwords. When you change any info, it should ask you if you want to save new pw. It also is good for form filling (entering your name, address etc). Highly recommended.

Description : Do you still have to remember usernames with "SuperGenPass"? what about password lenght requirements that are diff on diff sites, also: any alternatives you guys use that's 100% hacker safe?

Last Answer : answer:i just use the same…i don’t care that people see me on empornium etc. but ofcourse, everything will never be fully hackproof…

Description : i do not remember my administer password for windows 7

Last Answer : Start your laptop in SAFE MODE. On the start menu goto control menu and select "USER ACCOUNTS". Add another account for yourself with Administrative access. Use this account to change the ... ALWAYS destroy the harddrive to asure that no hidden personal information can be accessible to others.

Description : I don't remember the password to my iPod touch 4th gen. Any help?

Last Answer : Go into itunes and click on restore, it'll restore to factory settings. Everything will be gone, but aslong as you've kept it sync'ed to iTunes you'll be fine.

Description : i cant remember my password and cant access my acct.?

Last Answer : how do i retreive my password?

Description : The most important advantage of a video disk is a. Compactness b. Potential capacity c. Durability d. Cost effectiveness

Last Answer : Compactness

Description : The primary advantage of key-to-tape data entry system is a. A large percentage of editing can be performed at the time of data entry b. Key verification is easily performed c. The tape is reusable d. Keying errors can be detected as they occur

Last Answer : The tape is reusable

Description : The advantage of COM are its “ and “ a. Compact size; speed readability b. Compact size, speed c. Readability; speed d. Low cost; readability

Last Answer : Compact size, speed

Description : Most important advantage of an IC is its a. Easy replacement in case of circuit failure b. Extremely high reliability c. Reduced cost d. Lower power consumption

Last Answer : Extremely high reliability

Description : Which of the following is an advantage to using fiber optics data transmission? a. resistance to data theft b. fast data transmission rate c. low noise level d. all of above

Last Answer : fast data transmission rate

Description : A ________ switch combines space-division and time-division technologies totake advantage of the bestof both. A) TST B) SSS C) TTT D) none of the above

Last Answer : TST

Description : What is the advantage of FDDI over a basic Token Ring?

Last Answer : Fiber distributed Data Interface. A high speed token ring networking technology designed to run over optical fiber. FDDI is able to tolerate a single break in the cable or failure of one station due ... token before it is allowed to transmit. 802.5 and FDDI are examples of token ring networks.

Description : I am hacked and need some help!

Last Answer : You might want to either take it to a repair shop or pay someone to come to your home to check it out connected to your service provider. It's NOT going to be cheap; but what you're ... hacker who might love the challenge of figuring out what your hackers are doing & enjoy shutting them down!!!

Description : What interface card do you need toconnect to a network? A) ISP card B) Wireless card C) Router D) NIC

Last Answer : NIC

Description : Does anyone remember the company All Advantage.com? Where did they go?

Last Answer : answer:They were victims of the first big Internet crash. From wikipedia: AllAdvantage ultimately fell victim to the sharp decline in advertising spending as the dot-com bubble burst and the U.S. economy ... it closed its doors, the company had paid out over $160 million to its members.[10]

Description : Application layer protocol defines ____ a.types of messages exchanged b.message format, syntax and semantics c.rules for when and how processes send and respond to messages d.all of the mentioned

Last Answer : d.all of the mentioned

Description : Which among the below mentioned protocols provides a mechanism of acquiring an IP address without manual intervention in addition to plug and play type of networking? a. BOOTP b. DHCP c. Both a & b d. None of the above

Last Answer : b. DHCP

Description : The functionalities of the presentation layer include ____________ a. Data compression b. Data encryption c. Data description d. All of the mentioned

Last Answer : d. All of the mentioned

Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Transmission control protocol ___________ a. is a connection-oriented protocol b. uses a three way handshake to establish a connection c. receives data from application as a single stream d. all of the mentioned

Last Answer : d. all of the mentioned

Description : Which of the following is a data link protocol? a. ethernet b. point to point protocol c. hdlc d. all of the mentioned

Last Answer : d. all of the mentioned