A group of computers that share resources are called what?A routerA personal computerA networkA server

Answers

Answer 1

Answer: The answer you are looking for is a network.

Explanation: Let’s see why. A router is a device that directs incoming and out coming net traffic to the next appropriate routing point.
A personal computer is a personal computing device that enables you to interact with and use programs or applications in the digital world.

A network is when several computers are connected using a specific type of infrastructure so that they can share resources, “talk” and see each other.

A server is a computing unit which use is to provide resources a client might ask for. An example of that is you using your computer (client) and open a site in the browser, here the site’s server is sending the sites data to your browser so you can see it.
Hope that makes it a bit clearer.

Answer 2

A group of computers that share resources is called a network. A network allows computers to communicate with one another and share resources like files, printers, and internet connections. In a network, various devices such as routers, personal computers, servers, and other peripherals can play essential roles.

A router is a device that helps connect multiple computers in a network, directing traffic and ensuring data reaches the correct destination. Personal computers are individual devices used by people for a wide range of tasks, and they can connect to a network to access shared resources. A server is a powerful computer that stores and manages data, applications, and services used by the network's connected devices.

In summary, a network is a term used to describe a group of computers that share resources, while routers, personal computers, and servers are components of the network that play different roles in facilitating communication and resource sharing.

You can learn more about the network at: brainly.com/question/15088389

#SPJ11


Related Questions

which mathematician is regarded as the first computer programmer?

Answers

Answer:

Ada Lovelace

Explanation:

write a programme to input the values of two angle and find out the third angle of a triangle​

Answers

Answer:#include <stdio.h>

int main()  

{  

   int ang1, ang2, ang3; /*are three angles of a triangle  */

 

   /* Read two angles of the triangle from user separated by comma*/  

   printf("Input two angles of triangle separated by comma : ");  

   scanf("%d, %d", &ang1, &ang2);  

 

    ang3 = 180 - (ang1 + ang2);  /* Calculates the third angle  */

 

   printf("Third angle of the triangle :  %d\n", ang3);  

 

   return 0;  

}  

alicja is working on a project to deploy automated guided vehicles on the industrial shop floor of the manufacturing plant in which she works. what location of computing would be best for this project? a. remote b. off-premises c. edge d. fog

Answers

For the project of deploying automated guided vehicles on the industrial shop floor of a manufacturing plant, the best location of computing would be the c) edge.

The edge computing model involves processing data near the source, which in this case would be the manufacturing plant. This would allow for real-time data analysis and decision making, which is crucial for the safe and efficient deployment of automated guided vehicles on the shop floor. Additionally, using edge computing can also reduce latency, improve security, and save bandwidth compared to remote or off-premises computing.

So for the question is to the answer is c) edge.

Learn more about edge deploy: https://brainly.com/question/25757815

#SPJ11

1.printer is an example of......... device.

Answers

Printer is an example of output devise.It gives hard copy output on paper .

1. Printer is an example of output device.

I hope it's help you...

checkpoint 7.4 write the definition for an int array named empnums with 100 elements.

Answers

To define an int array named empnums with 100 elements at checkpoint 7.4, you can write the following code: ```c++ int empnums[100]; ``` In this code, "empnums" is the array name, "int" specifies that the array will store integer values, and "100" indicates the number of elements in the array.

the definition for an int array named empnums with 100 elements would be:  empnums = new int[100]; This creates an array of integers called "empnums" with a capacity of 100 elements. You can access and manipulate each element using its index, which starts at 0 and goes up to 99.

Learn more about  empnums here;

https://brainly.com/question/31422049

#SPJ11

You learned that you can use the tags to insert a link to another webpage. One problem that webpage developers face is that, after a time, links may no longer work. Can you think of ways that you can avoid broken links?

Answers

Answer:Image Control

We can use the height and width properties to control the size of our image. Let’s say we only want the recipe image to take up approximately one-third of the page. Do you remember from math class what percentage one-third is? Type in the following CSS rule, and watch your picture change size before your very eyes!

img {

   height:33%;

   width:33%;

}

That wasn’t too difficult, right? Let’s make the image stand out a bit more by adding a border. Inside the img rule, add the following declarations:

border-style:dashed;

border-width: 5px;

Your picture should now have a dashed border around it that is five pixels in width. Play around with the different border styles that are available. You should see a drop-down box of choices, including dotted, dashed, double, groove, inset, and outset. You can also adjust the width of your border. Using your informative guessing skills, can you predict what property you might use to change the color of the border? Try it and see if you’re right!

Explanation:

 this is a direct quote from my lesson

Choose the best translation: website red correo basura software sitio web

Answers

These terms refer to the technological part of online communication. A website network is a collection of websites that are related to each other.

Spam is unwanted messages that are sent over the network.The software refers to the computer software used to carry out specific tasks.A website is an online resource that contains a set of information and digital resources.

It is important to know the appropriate terminology in the language in which you are working to avoid confusion and errors. In today's world, where technology and communication play a fundamental role, precision in the translation of technical terms is especially important.

In summary, it is essential to understand and correctly use technical terms in communication related to technology and information technology, as incorrect terminology can lead to confusion and misunderstandings. The proper translation of words and technical terms is fundamental to guarantee a clear and effective understanding of the information, whether in business, academic or personal communication.

Lear More About Software

https://brainly.com/question/28224061

#SPJ11

Answer:

Sitio web

Explanation:

Question
1. Who was the first to use an abacus

Answers

Answer:

The Chinese

Explanation:

The base 10 number 18 is equal to which base 16 number?

10

12

14

16

Answers

Answer:

1 2 base 16

Explanation:

To convert to base 16 you divide the number with 16. 18/16=1 remainder 2;1 divide by 16 is =1

From bottom to top :1 2

How to improve a poor game design puzzles

Answers

Answer:

Steal code from github omegaLoL

Explanation:

ez clap CTRL+C CTRL+V

A school is creating class schedules for its students. The students submit their requested courses and then a program will be designed to find the optimal schedule for all students. The school has determined that finding the absolute best schedule cannot be solved in a reasonable time. Instead they have decided to use a simpler algorithm that produces a good but non-optimal schedule in a more reasonable amount of time. Which principle does this decision best demonstrate

Answers

Answer:

Heuristics

Explanation:

The principle that this kind of decision demonstrate is Heuristics , this is because Heuristics can be used to solve problems when there is no known algorithm to resolve the problem.

Heuristics is a simple algorithm that can provide a good but not optimal solution in the shortest possible time i.e. a shortcut to solutions

Answer:

a

Explanation:

 

Which addresses identify a computer on the network?

Answers

There are two addresses that identify a computer on the network, which are the MAC address and the IP address.

A Media Access Control address is a unique identifier that is assigned to a computer's network interface controller for communication on the physical network. The MAC address is a 48-bit address that is permanently embedded into the hardware, which means it cannot be changed.An Internet Protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It serves two primary functions: identifying the host or network interface and providing the location of the host in the network.

The IP address is a 32-bit address that is typically dynamically assigned by a network administrator or a Dynamic Host Configuration Protocol (DHCP) server. However, it is possible to use a static IP address that is permanently assigned to a computer by a network administrator or user.Difference between IP address and MAC addressAn IP address is used to connect to the internet while a MAC address is used for identification purposes on a network.The MAC address is used to determine the unique device that is sending or receiving data on a network, while the IP address is used to locate and communicate with a specific device over a network.Therefore, both MAC and IP addresses are necessary for a computer to connect to and communicate on a network.

For such more questions on MAC address:

brainly.com/question/13267309

#SPJ11

please help me... I'd really appreciate it.

please help me... I'd really appreciate it.

Answers

Answer:

output is less

Explanation:

which two types of service accounts must you use to set up event subscriptions? answer local event administrators account collector computer account specific user service account default machine account network server machine account

Answers

The two types of service accounts must you use to set up event subscriptions are specific user service account and default machine account. The correct options are C and D.

What is service account?

A special kind of account renowned a "service account" is designed to represent a machine-based user who has to authenticate and be given permission to access data in APIs.

Service accounts are frequently employed in situations like: Executing workloads on virtual machines.

The service account serves as the application's identity, and the responsibilities assigned to it regulate which resources the programme can access. Other procedures exist for service account authentication.

Specific user service accounts and default machine accounts are the two types of service accounts that you must employ to configure event subscriptions.

Thus, C and D are the correct options.

For more details regarding service account, visit:

https://brainly.com/question/28963159

#SPJ1

Tell me 2-6 computer parts that are inside a computer.

Spam answers will not be accepted.

Answers

Answer:

Memory: enables a computer to store, at least temporarily, data and programs.

Mass storage device: allows a computer to permanently retain large amounts of data. Common mass storage devices include solid state drives (SSDs) or disk drives and tape drives.

Input device: usually a keyboard and mouse, the input device is the conduit through which data and instructions enter a computer.

Output device: a display screen, printer, or other device that lets you see what the computer has accomplished.

Central processing unit (CPU): the heart of the computer, this is the component that actually executes instructions.

Explanation:

Your data-recovery strategy must meet the following requirements: Back up all data files and folders in C:\Data. Restore individual files and folders in C:\Data. Ensure that data is backed up to and restored from external media. What should you do

Answers

To meet the requirements, you should implement a backup solution that regularly backs up all data files and folders in C:\Data to external media, such as an external hard drive or cloud storage. The backup solution should also allow for easy restoration of individual files and folders in C:\Data when needed.



1. Connect an external storage device to your computer, such as an external hard drive or USB flash drive.
2. Create a new folder on the external storage device for storing the backup files. You can name it something like "Backup_C_Data".
3. Open File Explorer and navigate to the C:\Data folder.
4. Select all the files and folders in the C:\Data folder.
5. Right-click the selected files and folders, then choose "Copy" or "Send to" and select the backup folder you created on the external storage device.
6. Wait for the copying process to complete. Once it's done, you will have a backup of all data files and folders in C:\Data on the external storage device.

To restore individual files and folders from the backup:
1. Connect the external storage device with the backup to your computer.
2. Open File Explorer and navigate to the backup folder on the external storage device.
3. Locate the individual files or folders you wish to restore and select them.
4. Right-click the selected files and folders, then choose "Copy" or "Send to" and select the C:\Data folder on your computer.
5. Wait for the copying process to complete. The selected files and folders will now be restored to the C:\Data folder.
By following these steps, you will ensure that your data-recovery strategy meets the specified requirements.

To learn more about backup; https://brainly.com/question/17355457

#SPJ11

what would you do if you got exposed on social media and (depression) who feels like that sometimes ?

Answers

Answer:

Sadness

Explanation:

Because i sad or mad

Answer:

nothing

Explanation:

i wouldn't get the app

Write a python code using tracy turtle to draw the following shape

Write a python code using tracy turtle to draw the following shape

Answers

Answer:

import turtle

t = turtle.Turtle()

R = 20

N = 8

def rect(x,y,w):

 t.penup()

 t.setpos(x,y)

 t.pendown()

 for _ in range(4):

   t.left(90)

   t.forward(w)

rect(0,0,R*N)

rect(R*N,0,R*N)

rect(0,-R*N,R*N)

rect(R*N,-R*N,R*N)

for x in range(1,N+1):

 t.penup()

 t.setpos(0,-R*x)

 t.pendown()

 t.circle(R*x)

Explanation:

Not a turtle expert, but this seems to do the job.

Please answer these questions thank you

Please answer these questions thank you

Answers

1. Computers are often used because they are able to hold lots of data in a very small space. They can work quickly and are much better at completing many tasks because of their speed and efficiency.

2. The action processing of data produces information that can be displayed or stored for future use.

3. Two internal components that are necessary for the computer to function are the CPU

(Central Processing Unit) and the RAM (Random Access Memory).

4. The external components of a computer are known as peripherals.

5. Components: CPU, RAM, Motherboard Peripherals: Keyboard, Mouse, Printers, Speakers

6. A CPU (Central Processing Unit) contains an ALU (Arithmetic Logic Unit), control unit, and registers.

7. A processor with two cores is called a dual-core processor and four cores is called a quad-core processor.

8. The control unit determines the sequence in which instructions are executed.

9. The control unit is primarily responsible for movement of data and instructions from itself to the ALU and registers and back.

10. The program counter holds the address of the instruction being processed at the time and the instruction register holds the instruction itself.

which installation method often requires you to immediately install updates from the internet after installation is complete?

Answers

An installation method which often requires an end user to immediately install updates from the Internet after installation is complete is: CD or DVD installation.

What is a software?

A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task and proffer solutions to a particular problem.

What is an installation?

An installation can be defined as a process through which a software application is configured and integrated into the memory of a computer system, in order to make it ready for execution of specific task.

In Computer technology, an installation method which often requires an end user to immediately install updates from the Internet after installation is complete is CD or DVD installation.

Read more on software installation here: https://brainly.com/question/22529307

#SPJ1

Complete Question:

Which installation method often requires you to immediately install updates from the Internet after installation is complete?

answer choices

Internet installation

App Store installation

Software subscription

CD or DVD installation

Why is it essential to design an architecture before implementing the software? (1 point)

Designing the architecture first is important so future developers can use the architecture as a reference.


Designing the architecture first makes time use analysis for the product easier.


Architecture design beforehand is essential because it encapsulates the complete cost analysis before launch.


Having a designed architecture ensures things are planned well and allows for evaluation of and changes to the project before deployment.

Answers

The reason why it is essential to design an architecture before implementing the software is option d: Having a designed architecture ensures things are planned well and allows for evaluation of and changes to the project before deployment.

What is the importance of architectural design in software design?

Architecture is known to be one that acts as the framework or the blueprint for any kind of system.

Note that it is one that tends to provide a form of an abstraction that can be used to handle the system complexity as well as set up some communication and coordination methods among parts.

Therefore, based on the above, one can say that The reason why it is essential to design an architecture before implementing the software is option d: Having a designed architecture ensures things are planned well and allows for evaluation of and changes to the project before deployment.

Learn more about architecture  from

https://brainly.com/question/9760486

#SPJ1

A trackerball is a pointing device

Answers

Answer:

nice

Explanation:

The amount of exercise time it takes for a single person to burn a minimum of 400 calories is a problem that requires big data.TrueFalse

Answers

True. Data (particularly, the number of calories burned during various forms of exercise) and the necessity of burning at least 400 calories are involved in this question.

It would need a lot of data from different people and routines to precisely calculate how long it takes for one person to burn 400 calories. Data refers to any set of values or information that is collected, stored, and processed by computer systems. Data can take many forms, including text, numbers, images, audio, and video. It can be structured, such as in a database, or unstructured, such as in social media posts or emails. Data is used in a wide range of applications, from business analytics and scientific research to social media and online shopping. The processing of data is an important aspect of many industries and fields, including healthcare, finance, marketing, and engineering. The collection and use of data raise important ethical and legal issues, such as privacy, security, and access. Effective management and analysis of data are essential for making informed decisions and achieving business objectives.

Learn more about Data here:

https://brainly.com/question/21927058

#SPJ11

Steps 5 and 6 of the security risk assessment process are to determine the possible ways to accomplish a key task and how feasible each option would be to implement. What is that task? a. cost-benefit analysis b.asset replacement c. threat mitigation d. event identification

Answers

According to the question, the task is cost-benefit analysis is that task.

What is cost-benefit analysis?

Cost-benefit analysis is an economic tool used to evaluate the costs and benefits of a project or investment. It's a systematic approach to determine whether the benefits of a project or investment outweigh the costs. This assessment is done by assigning a monetary value to each benefit and cost and then comparing the total benefits to the total costs. Cost-benefit analysis is used to inform decision making in both the private and public sectors. It can help identify the most cost-effective solution, inform policy decisions, and ensure that resources are used efficiently.

To learn more about cost-benefit analysis

https://brainly.com/question/29316840

#SPJ1

Suppose a probe was sent to land on an airless moon. As the probe got close, the moon's gravity began pulling it straight down. The probe used its rockets to brake.

Unfortunately, a calculation error was made when the probe was designed. As the probe got close to the surface, the force of gravity became greater than the maximum force of its rockets.


Assuming the force of gravity was practically constant from that point on, describe the probe's vertical motion as it neared the moon's surface

Suppose a probe was sent to land on an airless moon. As the probe got close, the moon's gravity began

Answers

The description of the probe's vertical motion as it neared the moon's surface is that . The Moon's surface gravity is said to be weaker due to the fact that it is far lower in terms of mass than Earth.

What are Space Probe?

This is known to be a kind of unscrewed spacecraft sent from Earth and it is made to look out or explore objects in space.

Note that Space probes are a kind of  robots that work well or by remote control.

Note that they do ]take pictures and gather data and thus The description of the probe's vertical motion as it neared the moon's surface is that . The Moon's surface gravity is said to be weaker due to the fact that it is far lower in terms of mass than Earth.

Learn more about probe from

https://brainly.com/question/2323914

#SPJ1

if they run the tool again (but still with the destination ip address for code.org), in what way could the next packet's path be different? ????️note that there may be multiple answers to this question.

Answers

Answer:

Explanation:

stay the same  

move

how do you handle the integration between the old and new systems? adapt the old module to integrate with the new module replace the old module with a new module provided by the erp

Answers

The old module should be modified to work with the new module. Replace the outdated module with a fresh one that the ERP provides.

What is module?A module in the context of computer software is a distinct chunk of code that may be independently developed and maintained for usage in various systems. Developers might write a module that includes the code needed to use a sound card or conduct I/O on a specific kind of filesystem, for instance. The module can then be made available to and used by any system that requires that feature, and independent module development can subsequently take place. This strategy is referred to as modular design.A module in computer hardware is a standalone component that is utilised as a part of a more intricate system. A memory module, for instance, can interface with a computer's motherboard and function as a component of the overall system.

To learn more about module refer to:

https://brainly.com/question/18084961

#SPJ4

so i just went to play forge of empires and when i logged on to it all of my progress was gone and i was so far in to it

Answers

Answer:

That's tough...

Explanation:

Answer:

ok and?

Explanation:

This is not a question

An open letter this week says that major leaders in tech, professors, and researchers are concerned about the rapid develop of what type of technology?

Answers

The open letter that has been making headlines this week is focused on the rapid development of artificial intelligence (AI) technology. The letter highlights the urgent need for cooperation between stakeholders, including researchers, policymakers, and the public, to ensure that the potential benefits of AI are realized, while the risks are mitigated.

The letter, signed by over 2,600 AI and robotics researchers, as well as leading figures in tech such as Elon Musk and Steve Wozniak, raises concerns about the potential dangers of AI if left unchecked.The letter emphasizes the need for responsible development and deployment of AI technology to avoid the risks of unintended consequences such as accidents, unintended use, or malicious use. It also highlights the importance of understanding the societal and ethical implications of AI, such as job displacement and bias in algorithms.The signatories of the letter believe that the rapid advancement of AI technology presents significant challenges and opportunities for society, and that it is critical that these challenges are addressed now, while the technology is still in its early stages of development.

For such more questions on artificial intelligence

https://brainly.com/question/30192979
#SPJ11

MC - Chapter 08: In a circular array-based implementation of a queue, what is the performance when the enqueue operation must resize the array?O(1)
O(n)
O(N2)
O(log n)

Answers

In a circular array-based implementation of a queue, the performance of the enqueue operation when the array must be resized is O (n).

In a circular array-based implementation of a queue, the enqueue operation involves adding an element to the end of the array. If the array is full and needs to be resized, this operation will have a performance of O(n), because the entire array must be copied to a new, larger array. This requires a loop that iterates through each element in the original array and copies it to the new array, which has a time complexity of O(n). Therefore, the performance of the enqueue operation when the array must be resized is O(n).

Here you can learn more about enqueue operation https://brainly.com/question/24188935

#SPJ11

Other Questions
Before you can multiply two matrices together, the number of ___ in the first matrix must equal the number of rows in the second matrix. Why do we calculate percentage error? What is the 3x 1 problem called? Every cell in our body needs oxygen and nutrients to produce energy. When we inhale, oxygen is taken into and transported to various parts of the body. Cells use oxygen to break down the nutrients we get from the food we eat to release energy. During this process waste products are produced. Which organ systems work together during the process described above? The mesosphere is the layer of Earth's atmospherebetween 50 kilometers and 85 kilometers aboveEarth's surface. At a distance of 50 kilometers fromEarth's surface, the temperature in the mesosphere is-5 Celsius, and at a distance of 80 kilometers fromEarth's surface, the temperature in the mesosphere is- 80 Celsius. For every additional 10 kilometersfrom Earth's surface, the temperature in themesosphere decreases by k Celsius, where k is aconstant. What is the value of k? What is the surface area of the triangular prism? A piece of art is in the shape of a rectangular pyramid like the figure shown.How much glass is needed to cover the entire pyramid? 102.53 ft2 144.53 ft2 198.06 ft2 289.06 ft2 the volume of a triangular prism is V=1/2abh, where a is the altitude or height of the triangle, b is the base of the triangle and h is the height of the prism. solve for the formula V=1/2abh for H Which of the following regions have extreme scarcity of water chose all that apply. 1. Australia 2. Southwest of the United States 3. Russia 4. East coast of the United States Please HelpHow is an object's acceleration affected by its mass and the forces acting on it? Hersheys bar were purchased at $6 per dozen and sold at 1.25 each. find the profit on 14 dozen Hersheys bar. Question 10 (4 points) Find the scalar equation of the plane with vector equation (x,y.-)=(5.1.-1)+s(-4,1.0)+1(1,3,-2) For the reaction, indicate whether the standard entropy change, S298, is positive, negative, or zero. Justify your answer. A) S298 is zero because the reaction is known to be not spontaneous B) S298 is positive because the number of moles of gas are increasing C) S298 is negative because the number of moles of gas are increasing D) S 298 is negative because the reaction is known to be not spontaneous E) S 298 is zero because the number of moles of gas are increasing F) S298 is positive because the reaction is known to be not spontaneous pls i need help i dont wanna fail :( 13. How much NaCl is needed to make 75 mL of a 12% (w/v) solution? A) 30 g B) 6.0 g C) 7.5 g D) 9.0 g E) 12 g 14. Which solution is the most concentrated? Each choice refers to the same solute and solvent. A) 2.4 g solute in 2 mL solution B) 2.4 g solute in 5 mL solution C) 20 g solute in 50 mL solution D) 30 g solute in 150 mL solution E) 50 g solute in 175 mL solution 15. What is the molarity of a solution prepared by dissolving 10.0 g of acetone, C3H60, in enough water to make 125 mL of solution? A) 4.65 M B) 1.38 M C) 0.0465 M D) 0.0214 M E) 0.0125 M You are setting up for a party. There are 7 tables that eachneed 7 chairs at them.How many chairs do you need?I need help whats the answer Question 118 pts11) Five students in a graduate program were rndomly selected. Their grade point average (GPAs)when they entered the program were between 3.5 and 4.0. The following data were obtainedregarding their GPAs on entering the program versus their current GPAs. Find the equation of theregression line.Round the final answer to 3 decimals.Entering GPA/ Current GPA373.1383.7344.03338 What happens if the scrum team Cannot complete? recently in riverside, building contractors lobbied the city council to pass a law requiring all people working on residential dwellings be licensed by the city. why would the contractors lobby for this requirement? When using social networking services the penalties for ignoring requirements related to protecting.