1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blondinia [14]
3 years ago
7

The term used to describe an electronic device, operating under the control of instructions stored in its own memory, that can a

ccept data, process the data according to specified rules, produce results, and store the results for future use
Computers and Technology
1 answer:
nlexa [21]3 years ago
3 0
The answer to this is Computer!!
You might be interested in
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
Charra [1.4K]

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
8 0
3 years ago
Which careers use web browsers
oksano4ka [1.4K]
All of the above. If that’s not an option if it’s multiple choice let me know. Everyone uses web browser/the internet no matter the career.
5 0
2 years ago
An error occured trying to answer a question on brainly. What should I do?
nikdorinn [45]

You should probably retry answering it. Or two people are already answering it.

-Edge

7 0
3 years ago
Read 2 more answers
List 2 negative impacts of cybersecurity.<br><br><br><br>Answer and I will give you brainiliest ​
Nitella [24]

Answer:

Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.

5 0
3 years ago
A medium-sized highway construction company CST has chosen to constrain its investment in computing resources to laptop and desk
Valentin [98]

Answer:

The service model employed for the data storage capability of only CST is:

SaaS (Software as a Service).

Explanation:

The three cloud computing categories are Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS).  The three cloud computing services provide different virtual computing resources.  In the case of CST, it utilizes only the data storage software of a provider, who provides the data storage infrastructure, including cloud-based servers, while CST uses its own "laptop and desktop computers and other networking hardware and software to access the Internet efficiently."

5 0
2 years ago
Other questions:
  • Suppose that, even unrealistically, we are to search a list of 700 million items using Binary Search, Recursive (Algorithm 2.1).
    11·1 answer
  • Will somebody help me???? ANYBODY?? PLZZZZZZZZZZZZ
    8·1 answer
  • Cloud kicks recently completed the implementation of sales cloud. Cloud kicks has trained the users to use the mobile app to acc
    12·1 answer
  • Good business ethics is a good marketing strategy. Discuss
    13·1 answer
  • Which icons allows you to add a style to a chart
    13·1 answer
  • TRUE OR FALSE!!<br> Your location can be identified simply by turning on your cell phone..
    12·2 answers
  • POINT AND BRAINLIEIST GIVE AWAY!!!
    11·2 answers
  • Examples of system software include operating systems like macos, Linux, Android and
    10·2 answers
  • X = 9 % 2if (x == 1):  print ("ONE")else:  print ("TWO")
    13·1 answer
  • John has recently retired from an administrative, yet technical job which he held for 40 years. He decided to pursue a life-long
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!