1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetlana [45]
3 years ago
12

You learned about microcomputer a personal computer designed for use by an individual. Perform online research find out the diff

erent types of microcomputers in use and describe their features.
Computers and Technology
1 answer:
nadya68 [22]3 years ago
5 0

Answer :

Micro Computer :

Micro computer is a type of computer that is based on micro processor technology. It is smaller than main frame/Mini computer. And have less processing/working capabilities. It is inexpensive than other.

Types:

Desktop computers

Laptop / Notebook

Tablet

Smartphone

Server

Desktop computer :

It is a type micro computer that consist of keyboard, mouse, system unit and a primary displaying screen. It is reliable, efficient. It is inexpensive. It needs continuous power supply

Laptop

It is a other type of micro computer that is bit expensive then desktop computer it is portable. And also consist of battery to use when power supply are not attach. It's performance is better than desktop computer. Notebook is same as laptop but smaller or lighter than laptop.

Tablet:

It is a type of micro computer. It is also a portable computer and having touch screen display it is smaller than notebook and greater than smartphone it includes various variety of software.

Server computer:

It is also a type of micro computer. it is a powerful computer. It is used in organization to manipulate data. It is powerful than desktop computer and having great processing capability. It is expensive.

Smart phone:

Smart phone are also a type of micro computer. Micro processor are also used in it. It is much expensive, smaller then tablet computer having touch screen display, keypad and also having calling function. It is portable and contains more interesting apps.it consists of battery. Nowadays it is need of hour.


You might be interested in
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
Anni [7]

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

6 0
3 years ago
Which of the following is not a property of a WAN:
docker41 [41]

Answer:

Option d is the correct answer for the above question.

Explanation:

  • WAN is a type of network that facilities network connection all over the world. It can connect every computer which is in anywhere in the world while the other technology like LAN and MAN is used for small area locations.
  • The above question asked that about that statement which is not the property of WAN and that is option d because it states that WAN is used to connect only small areas of computers, but it can connect all the computers of the world, while the other property is valid for WAN.
6 0
3 years ago
What can you do with youtube red that you cant do with a normal account?
ipn [44]
No, Ad's. Extra Videos Created By Youtube, and thats about it lol oh and you can play the audio in the background of your phone, like lets say your listening to some music on youtube, and you want to play a game on your phone while listening to that tune on youtube, i just said screw youtube, i jailbroke my device and i have 20X more control of my youtube setting, etc.. and plus i can do more without youtube red tbh lol.
7 0
3 years ago
Read 2 more answers
What is decorator and how to use it wit Python programming language?
SCORPION-xisa [38]

Answer:

Decorators are very powerful and useful tool in Python since it allows programmers to modify the behavior of function or class. Decorators allow us to wrap another function in order to extend the behavior of wrapped function, without permanently modifying it.

Explanation:

5 0
3 years ago
A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused
sweet [91]

Answer:

a. True

Explanation:

The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.

A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.

The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.

6 0
3 years ago
Other questions:
  • Where did the fd00::0:0:0:1 address that you supplied for the dns recursive name server ipv6 address list option come from?
    8·1 answer
  • You approach a railroad crossing with a cross buck sign that has no light or gates . What should you do ?
    5·1 answer
  • Connie decided that her paper should be organized in the order in which the events happened. What type of organizational method
    15·1 answer
  • Taday is the anniversary of September 11, 2001. you were to meet the child of a victim or survivor of 9/11, what would you say t
    14·1 answer
  • In C++ :
    6·1 answer
  • 1. The first popular animated feature film was 1937’s Snow White and the Seven Dwarfs. (1 point)
    8·1 answer
  • Describe how pseudocode makes programming more efficient for large programming tasks.
    10·2 answers
  • Hydraulic pressure is the same throughout the inside of a set of brake lines. What determines the amount of resulting mechanical
    7·1 answer
  • Dis-cord and/or snap????????????? Im 13 ! and a girl :)))))
    12·2 answers
  • 3.There are 3 arrays that hold related data at each position (parallel). The first array holds product codes. The second holds t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!