1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OverLord2011 [107]
2 years ago
11

Paragraph on uses of computer 100 words plss​

Computers and Technology
1 answer:
Eva8 [605]2 years ago
8 0

REFER TO ATTACHMENT・ᴥ・

You might be interested in
Which of the following statements are true?
grin007 [14]

Answer:

I think the answer are two which are B and C

7 0
3 years ago
Which of the following is not an operating system
mrs_skeptik [129]

Answer:

C

Explanation:

I hope this helped.

3 0
3 years ago
Read 2 more answers
Were Al Zink’s actions that of someone trying to be an invisible Sponsor
AlexFokin [52]
Al Zink actions differentiate him as trying to take an invisible role as a project sponsor. That is, Al Zink does not do his chosen role and accountability as the lead project sponsor. Though, in dissimilar occasions, Al Zink is seen to evade making a serious choice regarding the development of the project. Consequently, as a project sponsor, it is his accountability to deliver clear steps in increasing the project, recover every step of project development and balance the start of the project. 
7 0
3 years ago
Select the correct category of cybersecurity described.
Shalnov [3]

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

6 0
2 years ago
Real GDP is found by removing the effects of inflation. How is this done mathematically?
tia_tia [17]
<span>B. By dividing Real GDP by (100/100-inflation rate).</span>
3 0
3 years ago
Other questions:
  • Which information technology job has the lowest predicted 10-year growth? computer programmer software developer computer suppor
    13·1 answer
  • In a right triangle, the square of the length of one side is equal to the sum of the squares of the lengths of the other two sid
    10·1 answer
  • What security protocol originally came with 802.11 equipment?
    11·1 answer
  • What item on a business card is generally the most prominent?
    10·2 answers
  • Predict how digital video will be viewed in the future. Step into the year 2028. How are people viewing digital video? Or have w
    13·2 answers
  • What is included on the HP PC Hardware Diagnostics 3-in-1 USB Key that allows you to recover systems that cannot boot?
    14·1 answer
  • Radio and television are examples of
    9·1 answer
  • In an experiment in which participants sat in an office and then were asked to remember what they saw in the office, participant
    6·1 answer
  • You are between flights at the airport and you want to check your email. Your wireless settings show two options:
    14·1 answer
  • Which engineer may design a GPS for a vehicle?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!