1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
8

Only business writing requires an editing stage

Computers and Technology
1 answer:
s344n2d4d5 [400]3 years ago
5 0

What is your question exactly?

You might be interested in
Your crt monitor flickers. what should you do
NikAS [45]
To stop your<span> CRT </span>screen<span> from </span>flickering<span>, </span>you<span> need to change the rate (Hertz) at which </span>your monitor<span> refreshes. To </span>do<span> this in Windows 7, begin by clicking on Start></span>Control<span> Panel></span>Display<span>. This </span>will<span> bring up </span>your<span> computer's </span>display<span>settings.</span>
6 0
4 years ago
The SETI (Search for Extraterrestrial Intelligence) project collected vast amounts of data that needed processing. SETI was one
I am Lyosha [343]

Answer:

grid computing

Explanation:

Based on the information provided within the question it can be said that this technology is typically known as grid computing. Like mentioned in the question, this is a type of processor architecture in which various computer resources are combines from different domains in order to work together towards a common main objective. Which is exactly what SETI has done by using many individual's computers to essentially create one supercomputer capable of handling all the data.

6 0
4 years ago
What does a proxy server do?
Otrada [13]

I believe your answer would be C, but that also falls under a VPN.


8 0
3 years ago
Read 2 more answers
Classified Computer by their age​
andreyandreev [35.5K]

Answer:

The answer is below

Explanation:

Classification of computers by age are the following:

First generation from 1940 to 1956. For example, ENIAC using a vacuum tube

Second generation from 1956 to 1963. For example, IBM 7070 using transistor

Third generation from 1964 to 1971. For example, this type of computers use an Integrated circuit

Fourth generation from 1972 to 2010. For example, IBM 5100 using a microprocessor.

Fifth-generation from 2010 to present For example IBM Watson, using Artificial intelligence.

5 0
3 years ago
Sample answers of What assets were targeted Stuxnet and the team behind the worm?
Damm [24]
The assets were programmable logic controllers (PLCs).  Which controlled systems like prison doors and centrifuges for separating nuclear material. 

The "who" is still debated.  Credit (if you use that word) is given to the Equation Group.  But that is still hotly debated as there seems to be a political agenda with the attack and many still believe this was nation-state sponsored.  I can be easy to leave digital fingerprints behind to make it seem like a known hacking team.
8 0
4 years ago
Other questions:
  • While the term ________ refers to an elaborate solo song frequently used in opera, the term ________ refers to sung dialogue fre
    12·1 answer
  • What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more
    10·1 answer
  • Which amendment discussed in the unit do you think has the greatest effect on your life? Why?
    14·1 answer
  • Obtain a file name from the user, which will contain data pertaining to a 2D array Create a file for each of the following: aver
    5·1 answer
  • A page can have High needs met rating even if it is not related To the topic of the query​
    9·1 answer
  • A type of backlight technology most commonly used in modern laptop devices is called____________.
    9·1 answer
  • Select each task that may be completed using a word processor.
    8·2 answers
  • How do design elements and color work together on a web page?
    15·1 answer
  • Complete the output for the following program?
    10·1 answer
  • What is meant by normalization? Occurs when an intrusion detection system labels normal activity as anomalous. The process of tr
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!