1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
3 years ago
10

What do people use computers for?

Computers and Technology
1 answer:
OLEGan [10]3 years ago
6 0
Computers can be used for numerous things haha for one, research, games, connection from distances, and homework. 

If you want more information because this one doesn't suffice, private message me or comment and I will fulfill your request!
You might be interested in
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
PLZ HELP HELP HELP ME I NEED ANSWER MATH​
irina [24]

The first one is 0 (0/3=0)

The second one is 3 (3/3=1)

The third one is 2 (6/3=2)

The fourth one is 9 (9/3=3)

Hope this helps you :)

4 0
2 years ago
Read 2 more answers
What are the missing letters _A_TO_ ( 6 letters) a type of computer.
aliina [53]

Explanation:

its a laptop ☺️. . . . . .. . .

4 0
2 years ago
Read 2 more answers
__________ is a special place on the hard drive where items from memory can be temporarily stored for fast retrieval
andrew-mc [135]
The answer is swap file 
6 0
3 years ago
Read 2 more answers
Which of the following words, if it replaced the word "enthusiasts" in the sentence above, would CHANGE the meaning of the sente
Sonja [21]

Answer:

I would need the sentence to make sure that I am correct but I am pretty sure it is C. aficionados

Explanation:

7 0
3 years ago
Other questions:
  • After a robbery, what is the purpose of conducting a neighborhood canvass?
    9·1 answer
  • What is the name of the unique identifier assigned to any personal computer that is connected to the internet?
    11·1 answer
  • An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
    14·1 answer
  • Which one my guys I need help
    7·1 answer
  • Can be referred to as a universal network of interrelated computers which delivers a very wide variety of information and commun
    9·1 answer
  • For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used
    15·1 answer
  • The Electronic Age began in the<br> A. 1940s<br> B. 1970s<br> C. 1980s<br> D. 1990s
    11·2 answers
  • According to the video, which tasks do Police Patrol Officers perform? Select all that apply.
    15·2 answers
  • Which of the following do nylon and Kevlar fibers have in common?
    14·1 answer
  • Which of these technologies has been most used by terrorist organizations?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!