1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
postnew [5]
3 years ago
12

The two key elements of any computer system are the ________ and the ________.

Computers and Technology
1 answer:
mezya [45]3 years ago
5 0
The second the hardware and the software
You might be interested in
Kara has been asked to create an employment application form for her company. Which of the following items can she use to make s
TEA [102]

Answer:

hehe the drawing toolbar has been used for school and block and Jerry hall is good enough

6 0
4 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
What are the document involved in E payment​
worty [1.4K]

An e-payment system is a way of making transactions or paying for goods and services through an electronic medium, without the use of checks or cash. ... As the world advances more with technology development, we can see the rise of electronic payment systems and payment processing devices.

8 0
3 years ago
What are the basic Mouse actions called and how are they executed
Nata [24]
The left side is a shortcut for 'Enter' the small wheel in the middle is used to scroll your view of the object,The right is used to intialize options pop-up to edit or initiate commands of the intended target


6 0
3 years ago
Assume a user datagram connection sending 500 bytes to a client. the first byte is numbered 501. what is the sequence number of
Readme [11.4K]

Answer:

501.

Explanation:

In Transmission Control Protocol (TCP), sending and receiving of data is done as byte. These bytes are eventually grouped into packets referred to as segment.

The sequence number of the segment if all data is sent in only one segment is the same as the first byte of that segment.

In this scenario, a user datagram connection is sending 500 bytes to a client and the first byte is numbered 501. Thus, if all data is sent in only one segment, the sequence number of the segment is 501. The 501 represents the initial segment number (ISN).

However, assuming the same data was sent in five (5) segments. The sequence number would be;

First segment (1st) = 501.

Second segment (2nd) = 1501.

Third segment (3rd) = 2501.

Fourth segment (4th) = 3501.

Fifth segment (5th) = 4501.

5 0
4 years ago
Other questions:
  • What most distinguishes projects with a strong need for computer animation from projects without such a strong need?
    8·1 answer
  • You can choose which rules you want excel to use by enabling and disabling them in the ____ area in the excel options dialog box
    11·1 answer
  • What is the f(n) runtime of the following pseudocode: sum-0 for A = N/2 downto 1 for B-1 t increment sum by B Explain: exactly w
    13·1 answer
  • To help determine which technology to use, Raul creates a table to help him compare the pros and cons of his choices. What part
    15·1 answer
  • For what tools such as USMT and Treanxition used?
    15·1 answer
  • A(n) ____ is an entry in a cell that contains text such as "2016 Sales" or "Travel Expenses."
    10·1 answer
  • Consider a Rational class designed to represent rational numbers as a pair of int's, along with methods reduce (to reduce the ra
    15·1 answer
  • Explain the different type of shift register counter ​
    14·1 answer
  • If a person's mobile phone was designed to work with 4G technology, what will happen when a 5G network is rolled out in their ar
    14·1 answer
  • CODEHS- Can someone please help me with this! It is due tomorrow.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!