1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
3 years ago
13

Five indicators of computer illiteracy​

Computers and Technology
1 answer:
melisa1 [442]3 years ago
8 0

1. Isn't fluent in "geek language"

2. Doesn't know how to use a web browser and it's features

3. Doesn't understand what a computer is and how it works

4. Doesn't know the basic parts of computer hardware

5. Doesn't know how to use a computer or any other electronics

You might be interested in
What are the reasons why is it necessary to evaluate online sources and content?
marissa [1.9K]
1) You don't know if the source is reliable. 
2) It is better to cite reliable sources so.
7 0
3 years ago
Write a query to display the department name, location name, number of employees, and the average salary for all employees in th
Zigmanuir [339]

Answer:

is hjs yen ; he jawjwjwjwjw

6 0
2 years ago
Explain demand paging with a proper example
julia-pushkina [17]
<h2><em><u>Demand</u></em><em><u> </u></em><em><u>paging</u></em><em><u> </u></em><em><u>:</u></em></h2>

<h3><em>In computer operating systems, demand paging (as opposed to anticipatory paging) is a method of virtual memory management. In a system that uses demand paging, the operating system copies a disk page into physical memory only if an attempt is made to access it and that page is not already in memory (i.e., if a page fault occurs). It follows that a process begins execution with none of its pages in physical memory, and many page faults will occur until most of a process's working set of pages are located in physical memory. This is an example of a lazy loading technique.</em></h3>

<h3 />

6 0
3 years ago
Where should a "deny all catch all" rule be positioned and why?<br> pleaseeee help!
insens350 [35]

Answer: For best performance and lowest latency, the MMU and CPU should support hardware ... broadcast, and subnet broadcast traffic with the deny-all catch-all filter rule for ... Please refer to the NetSight Wireless Manager User Guide (v5.1 or higher ) for a ... The rule must also be positioned above the 'Deny All' Default action.

Explanation:

6 0
3 years ago
Read 2 more answers
Which one of these choices best describes what exec() does:a) It replaces the current process with a new oneb) It executes a new
Dimas [21]

Answer:

Option b It executes a new process, which runs at the same time as the parent

Explanation:

The exec is one of the Java Runtime methods which is used to create a new process and run it as an separate process. Exec method executes the string command that we place inside the bracket. For example,

Process proc = Runtime.getRuntime().exec("Notepad.exe");

The statement above offers a convenient way to open the another computer software such as Notepad when running the program.  

3 0
3 years ago
Other questions:
  • 15. What type of presentation includes information created in a different Office application?
    7·1 answer
  • Which of the following groups would an animal with an exoskeleton, segmented body, and jointed appendages belong to???
    14·2 answers
  • What is the difference between 1080p and 2k?
    14·1 answer
  • Mr. Perry has bookmarked a large number of webpages in Chrome while researching class topics. Unfortunately, he's bookmarked so
    13·1 answer
  • Which is a form of cyber bullying??
    9·1 answer
  • ap csp The local, remote, and upstream _______ can each have multiple ___ _____. When a participant in a collaborative group on
    5·1 answer
  • Introduction to computing systems: from bits and gates to c and beyond
    7·1 answer
  • Differences of a desktop computer and a laptop
    13·1 answer
  • If a fire should break out in your building, which of the following actions is NOT recommended?
    10·2 answers
  • What are the different types of application architecture
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!