1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka-Z-Leto [24]
3 years ago
13

What is a basic operation of computers

Computers and Technology
1 answer:
ruslelena [56]3 years ago
8 0
What is the context of the question? With all that you have provided my best guess would be "computational function/solving"
You might be interested in
A software company is weighing whether to release a new version of its software as scheduled. The company can go ahead and relea
Kisachek [45]

Answer:

B) vaporware.

Explanation:

Vaporware is a software or hardware product that is not yet released in the market but has already advertised. This can be the product is probably still under development or it is still in its idea form and not developed at all. Vaporware is a term used in the computer products industry. Products that were announced but missed the released date by a big amount of time can also be called vaporware.

8 0
3 years ago
You have just read about a new security patch that has been made available for your Windows system, so you install the patch as
zhenek [66]

Answer:

A

Explanation:

The best action to take is to download and install the last good update; in that case, it will override the recent unstable update.

An update is not like a single program that can be add or remove from the control panel.

6 0
3 years ago
HELP ASAP!!!
Crazy boy [7]
The answer is a C..ur welcome
5 0
4 years ago
Two people can verify they are communicating with each other by using a ____________, which verifies each party's identity by be
photoshop1234 [79]

Answer:

b. Certificate Authority

Explanation:

Based on the information provided within the question it can be said that they are communicating with each other by using a certificate authority. This term refers to a company or organization that provides security verification by issuing both parties cryptographic keys which are specifically verified by the company in order to allow both parties to know exactly who they are communicating with.

5 0
3 years ago
Which two keys are commonly used to move or insert data?.
vlabodo [156]

Answer:

control and shift

Explanation:

6 0
3 years ago
Other questions:
  • Which feature of a browser will you select to block pop-ups? view help tools file
    15·2 answers
  • Which statement is the best description of a value proposition?
    7·2 answers
  • A binary search can be performed only on ____.
    6·1 answer
  • IF YOU ARE COMPUTER MASTER TELL ME WHICH SOFTWARE IS USED IN CALLIGRAPHY
    6·2 answers
  • A(n) ____ is a location on your computer screen where you type text entries to communicate with the computer’s operating system.
    9·2 answers
  • Way to minimize technical problems with your computer
    6·1 answer
  • A teacher wants a program to give extra points to students who fail a test. Write a Python program to do the following: (a) Ask
    5·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • Consider the following code example:
    12·1 answer
  • URGENTE DOY 60 PUNTOS. Porfavor alguien sabe como se llama el juego de mesa que consiste en adivinar la palabra con audifonos qu
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!