Plug-and-play devices are electronic devices that do not require any device driver to be manually installed on the host device (computer) and as such they start functioning immediately they are connected to the host device (computer).
Plug-and-play (PnP) can be defined as a technology that is designed and developed to allow an operating system (OS) of a computer to automatically detect and configure a peripheral (input and output device) as soon as they are connected to the computer.
On a related note, a plug-and-play device is an electronic device that do not require any device driver to be manually installed on the host device (computer) and as such it start to function immediately it is connected to the host device (computer).
In Computers and Technology, some examples of a plug-and-play device include the following:
External hard-driveComputer monitorKeyboardWeb-camMouseFind more information: https://brainly.com/question/17402566
the use of technology to observe a user's actions often without the user's knowledge is known as:
A) Unauthorized access
B) Industrial espionage
C) Computer surveillance
D) Denial-of-service attack
Answer:
C
Explanation:
Computer surveillance refers to spying that allows the viewer to gain access of all activity on the given computer.
it is possible to be logged into a wi-fi network that does not have internet access.
Answer:
yes it is possible. it'll take some work tho
Explanation:
you would have to bypass the security and disable the proxy and go through the firewall and do some other things to access it
I need help with this question.
Fill in the blank with the correct response.
When an app seems to have a personality, we say it has ____
What type of loop allows you to indicate the starting value for the loop control variable, the test condition that controls loop entry, and the expression that alters the loop control variable, all in one convenient place
Answer:
I think it's a for loop.
A for loop looks like:
for (starting statement; condition that is true; condition applied to iteration)
Explanation:
You are the administrator for a network with a single Active Directory domain called westsim. All computer accounts reside in organizational units (OUs) that correspond to departments. You have previously deployed a WSUS server in your location to specify the approved list of updates. All client computers are configured to download updates from your local WSUS server. You decide that you need to configure a separate update approval list for all computers in the Marketing department. You want the update list to be automatically identified based on the department membership for the computer. What should you do
5. The Shape Fill drop-down menu is used to
A b or c or d
Answer:
Change the color of the shape.
Explanation:
In the sentence, you must look at keywords, like "Fill" and "Shape".
The fact that it said shape fill means the tool would fill the inside of a shape.
Make sure to look at the definition of keywords to figure out what they mean.
Therefore, "Change the color of the shape" would be the correct answer.
-kiniwih426
the pathway through which an electric signal moved between devices is known as what?
A(n) ________ is an excellent tool for representing a system's component processes and the flow of data among them.
Write a program to output 3 lines of text with the following information:
Student's first and last name:
Class:
Born in:
Answer
Answer:
C LANG
#include <stdio.h>
// function main begins program execution
int main( void )
{
printf( "student's first name" );
} // end function main
PYTHON
student's name=''
born_date=''
class=''
print ('')
Explanation:
create an sql database rows and Columns then use sql commands to call any specific data if so :
(you have a complet database of students data)
SELECT born_date
FROM students
//(Call all students born_date )
//you can specify
********,*********
to create an sql table
CREATE TABLE students (
name char,
born_date int,
class int,
);
If the disaster requires actions offsite from the primary infrastructure, it is under the jurisdiction of__________.
Answer:
Business continuity
Explanation:
The disaster is affecting business functions and needs to be urgently remedied.
Can you make a phone app with angular?.
Answer:
yes
Explanation:
Which process refers to the process of translating between a set of private addresses inside a network and a set of public address outside the network
Answer:
The process of translating between a set of private addresses inside a network and a set of public addresses outside the network is called
IP pulling through use of a subnet mask bypass
alannah just purchased a smart lock for her front door. how can she connect her lock to the internet so she can control the lock when she’s away from home?
Answer: cellular connection
She can connect her lock to the internet so she can control the lock when she’s away from home by Bluetooth connection. The correct option is D.
What is a Bluetooth connection?Bluetooth technology enables devices to communicate with one another without the use of cables or wires.
Bluetooth operates on a short-range radio frequency, and any device equipped with the technology can communicate as long as it is within the required distance.
Some devices can be connected to your phone via Bluetooth without the use of a cord.
After the first time you pair a Bluetooth device, your devices may pair automatically. If your phone is connected to something via Bluetooth, a Bluetooth icon will appear at the top of the screen.
Alannah can connect her lock to the internet and control it via Bluetooth while she is away from home.
Thus, the correct option is D.
For more details regarding Bluetooth connection, visit:
https://brainly.com/question/28258590
#SPJ2
Your question seems incomplete, the missing options are:
A. network cable
B. cellular connection
C. power cable
D. Bluetooth connection
Help please match them if you just put a link or say “I don’t know but thanks for the points” I’ll report your answer and you won’t get the brainliest
Answer:
Input: The user clicks a button
Output: A song is played
User interface: A screen with buttons, images, and text
Explanation:
One of the difficult things about working in game design is that while there are many different roles, most of them only match one specific personality type.
True
False
Answer:
it's false
Explanation:
they don't match to personalities
a ________ uses electronic memory and has no motors or moving parts.
Answer:
a to uses electronic memory and has no motors or moving parts.
Explanation:
brainliest me and follow ty
A programmer wants to write code that directly accesses the computer’s hardware. Which is the best type of language for the programmer to use?.
Answer:
Assembly is the programming language that directly accesses the computer’s hardware.
How to emit from jquery in angular 8.
Answer:
idek what you just said
PLEASE HELP ME
(b) When a computer systems RAM becomes full it can use virtual memory.
Explain what happens if the computer does not have any virtual memory.
Answer:
it won't be able to run
Explanation:
because computer runs on physical memory
If a computer does not have any virtual memory, the consequences of running out of physical RAM can be quite problematic.
When the RAM becomes full, the operating system relies on virtual memory as a way to supplement the physical memory shortage. Without virtual memory, the system would have no way to manage or accommodate the excess data that needs to be stored temporarily.
As a result, the computer would likely start experiencing severe slowdowns, freezing, or crashing when attempting to run applications that require more memory than is available.
In extreme cases, the system might even become unresponsive or display error messages indicating a lack of memory. Virtual memory acts as a safety net, allowing the computer to continue functioning by utilizing a portion of the hard drive as temporary memory storage when physical RAM is exhausted.
Without this essential feature, the computer's ability to multitask and handle memory-intensive tasks would be severely hindered.
Learn more about virtual memory, click;
https://brainly.com/question/30756270
#SPJ3
What is the difference between the dom api and the html dom api.
Tamara is writing a program to organize students in a class and needs to use operators to organize student grades, then compare the results of that to each other. What kinds of operators does Tamara need to use for each step?
Tamara needs to use
operators to organize the students' grades, then
operators to compare the results.
Answer: you said "Tamara needs to use
operators to organize the students' grades, then
operators to compare the results."
i think your right
Explanation:
sounds right.
Which animation category provides custom animations for objects on the slide?
*it's d. motion paths
Answer:
d. Motion Paths
Explanation: is correct. post protected
As a game designer, your goal in game design is to get your players to fell like your game is the whole world. You want your players to obtain a state of deep engagement with the game that allows them to fully invest their imagination in the game's artificial world. If you successfully accomplish this, what have you mastered?
roguelike state
second person perspective
player immersion
seamless movement
My Answer:
Player Immersion
Explanation:
I love video games, so this is something I am also looking for. Player Immersion will successfully draw the player into the game, seamlessly hooked to it. In order to make this possible, focus on the big details, like the setting, the music, and the plot.
Setting: Must be immersive, big, and beautiful.
Music: Must be beautiful, grand, and can possibly get stuck in your head.
Plot: Must be plausible. Don't make a plot that doesn't tie into the game.
These are things that will definitely draw in your player, hence, the answer is player immersion.
Hope this helps!
W]hen a cryptographic system is used to protect data confidentiality, what actually takes place?
Answer: the Engine
Explanation:
once the engine take place its moves and goes faster
________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Human-computer interface d. Computer-aided design e. Total ownership
Answer:
a) reverse engineering
For questions 1-3, consider the following code: x = int (input ("Enter a number: ")) if (x != 8): print ("A") if (x >= 10): print ("B") if (x < 10): print ("C") if (x % 2 == 1): print ("D") What is output if the user types in 13?
Answer:
ABD
Explanation:
13 not equal 8, greater than 10 and odd. Ifs will be executed step-by-step
The Internet provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML.
Answer:world wide wev
Explanation:
What access-point feature allows a network administrator to define what type of data can enter the wireless network?
Project: On Assignment as a Web Developer
Assignment Directions:
Create a web page for a fictitious company: Widgets Inc. has hired you to make a mock-up for their new website. They are on a budget and only want to have a presence on the Internet. They do not need any fancy bells and whistles. They have sent you an email message with the basic parameters of the site.
The site should have at least three pages. They should include the landing page (commonly named index.htm), a contact page, and a "Meet the Company" page.
Each page should have an identical header containing the company name and motto: "We make widgets fun!"
Each page must include navigation back to the home page (without needing to use the Back button on the browser).
All font styles and alignment must be performed with inline CSS.
The company mascot is a dog, but there is no logo provided in this project. Any picture of a dog will do. Make sure it is prominently displayed on each page.
Each page should display in a web browser with a title.
All employees on the "Meet the Company" page can be random people's photos from the Internet. Please include Jack Sprat, President, Tom Thumb, Vice President, Sally Flag, Treasurer, and Monty Fuller, Secretary.
All text for these pages can be fake. See this website to create filler paragraphs.
Make up email addresses, but use the mail to: command as a hyperlink and display the person's name and not the actual address.
Each page should have a link to the other pages.
Link to at least three remote web pages. One of these should be formatted in an iframe.
The main page should have a sample product table including the following information:
Name Size Color Lead time Price Discount (for 10)
W-1 1X1 Blue 1 week $200.00 10%
R-2 2X2 Green 1 week $1,200.00 15%
D-2 2X3 Red 2 weeks $12,000.00 20%
Assignment Guidelines:
Projects will be assessed on following the requirements and style. Use color (creatively), at least two typefaces, headings, bold and italics, images, background colors, and so on to make your pages.
Submission Requirements:
Standard HTML
Question # 1
File Upload
Ensure that you fulfill all requirements, then upload your final web page project.
Answer:
It is not possible to upload files .html files here
Molly needs to access a setting in microsoft windows group policy to change the type of a network to which a computer is attached. Which setting must molly change?.
A computer is made up of different network. The setting that molly must change is network type.
A computer network is known to be a group of computers that are linked to each other so as to help the computer to communicate with another computer and share their resources, data, and applications.
A computer network can be classified based on their sizes. A computer network is of four types. They are:
LAN(Local Area Network)PAN(Personal Area Network)MAN(Metropolitan Area Network)WAN(Wide Area Network)Learn more from
https://brainly.com/question/14200752