1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lawyer [7]
4 years ago
12

Why do computer have Histrorys?

Computers and Technology
2 answers:
RideAnS [48]4 years ago
7 0
So you know what people are doing so they can be safe at all times
Orlov [11]4 years ago
6 0
To know all of the places youve been so you have an idea of where you could have picked up a virus or just to go back to previous pages that you didnt/couldnt save
You might be interested in
Data is best described as
viktelen [127]

Answer:

The answer is B

Explanation:

TOOK THE TEST

5 0
3 years ago
Read 2 more answers
Leslie Is doing a sociological study of people who have live remote island. She interviews the people and than she observes them
dimulka [17.4K]
Making guesses, as opposed to the other answers, this is the only one that forges new ideas and doing such will only lead to an illegitimate conclusion/study.
5 0
3 years ago
Read 2 more answers
Using the Internet, search and discuss why naming conventions are important and why programmers should consistently follow them.
LiRa [457]

Answer:

Answered below

Explanation:

Some variable naming conventions include;

1) Variable should begin with either a letter or an underscore.

2) Variables having multiple words should have the first letter of every word after the first word, capitalized. This is the camelCase style.

3) variables should not be named after any of the inbuilt keywords except on special operations to override the original function of such keyword.

4) variable names are case-sensitive.

The importance of following these conventions is to maintain readability and consistency of code. Failure to follow these conventions may lead to chaotic codes, bugs and inefficient performance.

7 0
3 years ago
Write a C program that stores the number 123.45 in the variable alpha, 98.76 in the variable beta, and 76.67 in the variable gam
Anon25 [30]

Answer:

C

Explanation:

the answer

8 0
2 years ago
Which of the following tools enables users to connect to a remote computer, including servers with no interaction required from
musickatia [10]

Answer:

Option (A) i.e., Remote Desktop is the correct answer to the following question.

Explanation:

The following option is correct because the remote desktop is an application or software which connects your computer to another system through the internet from anywhere and we can also connect with each other without the internet but in a range.

<u>Steps to connect in Windows 10</u>:

Step-1: Firstly, start your window and click on the start button.

Step-2: Then, type remote setting in search box.

Step-3: Then, you have to allow the remote access to the system.

Step-4: Then, you have select the Remote Tab which appears in System Properties.

Step-5: Then, you have to click and select the to Allow the Remote Connection.

7 0
4 years ago
Other questions:
  • Which are elements involved in diagramming a solution? Choose all that apply.
    10·1 answer
  • What guidelines should you follow when adding graphics to your presentations?
    14·2 answers
  • Which of these is not a combination of a keyboard and percussion musical instrument?
    13·1 answer
  • Using the syntax in section 2.3, write a command delete_all_rights (p, q, s). this command causes p to delete all rights the sub
    13·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    7·1 answer
  • Is anyone really good at immerse 2 learn??
    9·1 answer
  • What application service allows you to decouple your infrastructure using messaged based queues?
    10·1 answer
  • Which activity is the best example of a negative habit that may result from
    12·1 answer
  • _______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi
    12·1 answer
  • ____must cooperate with each other to neutralize the global threat of information censorship. Select 3 options.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!