1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SpyIntel [72]
2 years ago
12

Which is an example of analog device​

Computers and Technology
1 answer:
neonofarm [45]2 years ago
8 0

Answer:

crt (cathode ray tube) vcr (video cassette recorder)

Explanation:

You might be interested in
What is the Moore's law
Nadya [2.5K]

Answer:

Hi, in the law of Moore we can express aproxitmaly for each <em>two years</em> is duplicated the number of transitors in a microprocessor.

Explanation:

In around 26 years the number of transitors has increased about 3200 times, a transitor is a way to regulate the current voltage flow and can be act like a <em>switch</em> for an electronic signal.

I hope it's help you.

4 0
3 years ago
Which is a feature of a search engine? stores web pages belonging to a single website displays web pages within a browser finds
faltersainse [42]
Finds web pages that matches key words
8 0
3 years ago
Who is the author of computer programming pdf
mash [69]
Donald Knuth<span> began the project, originally conceived as a single book with twelve chapters, in 1962.</span>
5 0
4 years ago
A (n) _____, similar to a trojan horse, installs monitoring software in addition to the regular software that a user downloads o
galina1969 [7]

Answer:

Spyware

Explanation:

Internet is a type of computer network that allow device communicate with each other world wide. So, it is not the correct option.

Worm: this is a standalone malware computer program that replicates itself in order to spread to other computers. It spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. The major feature of a worm is ability to replicate on it own. So, it is not the correct option.

Bot: this is a software application that runs automated tasks. So, it is not the correct option.

Middleware: this is software that lies between an operating system and the applications running on it, enabling communication and data management. It provides services to software applications beyond those available from the operating system. So, it is not the correct option.

Spyware: this is the correct answer. Spyware is similar to trojan horse because it hides itself in a system and a user may not know that it exist on the system. Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information without knowledge of the user.

5 0
3 years ago
Read 2 more answers
What is the difference between the casual and consultative conversation? Why is it important for a person to know the difference
leonid [27]

Answer:

The answer is below

Explanation:

Casual conversation is a form of conversation that occurs between friends and families. There are no specific rules or manner in which the participants speak to each other. It is otherwise known as Informal Conversation.

Consultative conversation on the other hand is a form of conversation that occurs between people who have a close relationship but not actual friends or families.

For example, people involved in this type of conversation are the likes of Doctors and Patients, Counsellors and Students, etc. It is often considered a Semi-formal conversation.

The reason a person needs to know the difference between the two styles of conversation is for individuals to know how to present and conduct themselves appropriately during the conversation.

7 0
3 years ago
Other questions:
  • _____ is when network managers deal with network breakdowns and immediate problems instead of performing tasks according to a we
    9·1 answer
  • Explain the term remote backup with examples.​
    5·1 answer
  • The command to delete all the files that have filenames that starts with letter c or c and ends with a letter z or z is
    15·1 answer
  • How does computer network work in a paragraph
    12·1 answer
  • You are a disgruntled employee with a master’s degree in computer sciences who was recently laid off from a major technology com
    11·1 answer
  • You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why
    11·1 answer
  • As an improvement of the ATX form factor over AT, shorter wires made it easier to shield them and made them capable of handling
    6·1 answer
  • The Windows Remote Desktop Web connection that allows users to connect to a work or home computer and access files is considered
    7·2 answers
  • Thank you very much for your email. ...... was very interesting​
    15·1 answer
  • In the program below, which two variables have the same scope?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!