answersLogoWhite

0

LAN,WAN simply networking

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What is someone who accesses private information in a computer?

a hacker


A person that illegally accesses computer systems or databases is?

A person who illegally accesses computer systems or databases is commonly referred to as a hacker. This activity is known as hacking and is considered a cybercrime.


How is called A stripped- computer that accesses resources on a network?

a thin client


When Clara accesses the programs and documents on her computer by way of icons she is said to be?

Gui


When Clara accesses the programs and documents on her computer by way of icon is said to be employing?

graphical user interface


Does a Skype call affect ping?

Any program that accesses your computer and/or Internet will affect the ping. The answer is yes.


What does a higher ram memory do to your laptop?

Allows you to open applications faster. Gives the computer a boost in accesses time.


When Clara accesses the programs and when Clara accesses the documents on her computer by way of icons she is said to be employing A. CPU. B. Internet Explorer. C. Network. D. graphical user interface?

D - Graphical User Interface !


How do memory accesses impact the performance of a computer system?

Memory accesses impact the performance of a computer system by affecting the speed at which data can be retrieved and processed. Efficient memory access can lead to faster execution of programs, while inefficient memory access can result in delays and decreased overall performance.


What is a catche?

A cache is a collection of items of the same type stored in a hidden or inaccessible place, for future use. A computer has a memory cache that quickly accesses programs on the computer.


When does a computer access ROM?

A computer accesses ROM (Read-Only Memory) when it needs to retrieve essential instructions and data during the startup process or when performing basic functions.


What Subject Accesses section includes what possible accesses?

suitability and trustworthyness