1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrej [43]
2 years ago
11

A programmable machine can:

Computers and Technology
1 answer:
LuckyWell [14K]2 years ago
6 0

Answer:

Either be an embedded system, or a general purpose system.

You might be interested in
What does aperture control? A)amount of light the image sensor captures when taking a photo. B)how sensitive the camera is to in
My name is Ann [436]

Answer:

How sensitive the camera is to incoming light.

Explanation:

8 0
4 years ago
Read 2 more answers
4.2.10: Multiplication Table: Create a program using a for loop which will print out the 4’s times table through 10.
nordsb [41]

I included my code in the picture below. Best of luck.

6 0
3 years ago
A firewall, when properly implemented, can prevent most attacks on your system.
Verizon [17]
This is true, A firewall is used to get rid of viruses and attackers and keep them out of your computer. But if not properly implemented can do next to nothing for you.
5 0
4 years ago
Read 2 more answers
Processor speeds are in bytes.<br><br> True<br> or<br> False
Aneli [31]

Answer:

true

Explanation:

Mainly true, but partly false. There are two bits in a computer that supply speed: The processor (measured in hertz eg. 2Ghz Processor) and RAM (bits and bytes eg 2GB of RAM). The processor is more to do with the speed programs run and load at, and RAM let's you use lots of memory intensive programs at the same time, although this also comes down to the processor and vice versa. Hope I helped :)

5 0
3 years ago
Read 2 more answers
A doorknob is an example of which simple machine?
Zarrin [17]
A doorknob is an example of a:
D. Wheel and Axle. 
I hope this helped ^_^
3 0
3 years ago
Read 2 more answers
Other questions:
  • âwhen the footer is the last element in a page body, the _____ pseudo-element is used to add a placeholder element after the foo
    8·2 answers
  • Una pregunta cuales son los ataques de Sindel que por favor y me lo diga gracias
    11·1 answer
  • A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
    7·1 answer
  • Which is most harmful computer virus define​
    15·1 answer
  • _________ cards contain a chip that can store a large amount of information as well as on a magnetic stripe for backward compati
    12·1 answer
  • CC stand for.....in the email platform?
    12·2 answers
  • In many multiprocessor systems __________ is used rather than dedicated processor assignment; in order to evenly distribute work
    14·1 answer
  • PLEASE HELP me with at least 1 of the problems in the picture <br><br>We are coding using python​
    14·1 answer
  • 1. Wash all work surfaces with a_______ wrung in hot soapy water.
    9·1 answer
  • How do u type please help
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!