Answer:
A loopback cable is also known as loopback plug or loopback adapter, which is a plug used to test physical ports to identify network issue. It provides system test engineers a simple but effective way of testing the transmission capability and receiver sensitivity of network equipment. In a word, it is a connection device that is plugged into a port to perform a loopback test.
Explanation:
Mark me as brainliest please
How do you keep a class running after you use a class function once in Python 3.
Answer: Primitive data structures—like numbers, strings, and lists—are designed to represent simple pieces of information, such as the cost of an apple, the name of a poem, or your favorite colors, respectively. What if you want to represent something more complex?
For example, let’s say you want to track employees in an organization. You need to store some basic information about each employee, such as their name, age, position, and the year they started working.
what are the functions of super computer?
Answer:
Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modeling .
Explanation:
Hope it helps you
Answer:
Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modelling, etc.
If the system continuously reboots, what is most likely the problem?
Overheated CPU
Power Failure
Failed Hard Drive
Application Error
Aswer
overheated CPU
Explanation:
If the system is randomly shutting down or rebooting, the most likely cause is a heat problem. ·
1. Who was the first lady programmer?
Answer:
ada Augusta Bryon
Explanation:
that is the answer
Answer:
lady Ada lovelace
Explanation:
This is the real answer
You are setting up a home network for your friend. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they are waiting on the children. However, she is concerned about keeping her own data private at home network. What wireless feature can you configure on her AP (Access Point) to meet her requirement?
Answer:
A guest network
Explanation:
Which of the following animation is not common to both slide transition and
custom animation?
Answer:
slide transition pls mark me branilest
1. Explain all the types of computer virus
Answer:
1.File infecting virus
A virus that attached itself to an executable program. It is also called a parasitic virus which typically infects files with .exe or .com extensions. Some file infectors can overwrite host files and others can damage your hard drive’s formatting.
2. Macro Virus
This type of virus is commonly found in programs such as Microsoft Word or Excel. These viruses are usually stored as part of a document and can spread when the files are transmitted to other computers, often through email attachments.
3. Browser Hijacker
This virus targets and alters your browser setting. It is often called a browser redirect virus because it redirects your browser to other malicious websites that you don’t have any intention of visiting. This virus can pose other threats such as changing the default home page of your browser.
4. Web Scripting Virus
A very sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website.
5. Boot Sector Virus
These viruses are once common back when computers are booted from floppy disks. Today, these viruses are found distributed in forms of physical media such as external hard drives or USB. If the computer is infected with a boot sector virus, it automatically loads into the memory enabling control of your computer.
6. Polymorphic Virus
This virus has the capability to evade anti-virus programs since it can change codes every time an infected file is performed.
7. Resident Virus
A resident virus stores itself on your computer’s memory which allows it to infect files on your computer. This virus can interfere with your operating system leading to file and program corruption.
8. Multipartite Virus
A type of virus that is very infectious and can easily spread on your computer system. It can infect multiple parts of a system including memory, files, and boot sector which makes it difficult to contain.
Explanation:
hope its help
thank you