1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
3 years ago
8

A computer is a multipurpose device that accepts input processes data and produces output all according to a series of stored

Computers and Technology
1 answer:
yulyashka [42]3 years ago
8 0
According to a series of stored procedures 
You might be interested in
One of your co-workers has been issued a new smart card because the old one has expired. The co-worker can connect to the comput
Lady_Fox [76]

Answer:

The answer is "The global Address List (GAL) is publishes in the new certificates".

Explanation:

Describe the GAL with relate to smart card:

  • The GAL is a part of the outlook, that allows the users to make a group of mutual contacts and resources specified for your G Suite domain and searchable directory.  
  • It provides the main mail app, that offers you to make global contacts, and also provides basic contact, with the use of business shares global addresses with others.  In this process, the co-worker can change their smart card.
5 0
3 years ago
What is the exact number of bytes in system of memory that contains (a) 64K bytes (In Binary)(b) 32M bytes
VashaNatasha [74]

Answer:

64 K bytes = 65536 bytes

32 M bytes = 33554432 bytes

Explanation:

The question expect the number of bytes in binary instead of decimal. So this is important to understand that:

  • 1K bytes = 1024 bytes (in binary)

Therefore,

  • 64 Kb = 64 x 1024 =  65536 bytes

Using the similar calculation logic, we know

  • 1M bytes = 1024 x 1024 = 1048576 bytes (in binary)

Therefore,

  • 32 M bytes = 32 x 1048576 =  33554432 bytes
5 0
3 years ago
When was the GoPro camera invented?​
masya89 [10]

Answer:

2002

Explanation:

Please mark me brainliest :)

6 0
3 years ago
Which microsoft operating system started the process of authenticating users with a user name and password?
11111nata11111 [884]
It should be either windows 98 or windows xp but I think it is windows xp
5 0
3 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
finlep [7]

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


5 0
3 years ago
Read 2 more answers
Other questions:
  • In the two-level directory, if a user refers to a particular file then__________________ Select one: a. only his/her own UFD (us
    7·1 answer
  • Which type of network cover a large geographical area and usually consists of several smaller networks, which might use differen
    5·1 answer
  • What mode is generally used when delivering a presentation to an audience?
    8·2 answers
  • The term used to describe the shape and layout of a computer component such as a motherboard or hard drive is __ factor?
    14·1 answer
  • What is a perfect hashing function?
    13·1 answer
  • Identify the type of error described
    6·1 answer
  • Multi-part question:
    13·1 answer
  • if someone has become very attached to their mobile device and feels anxious if the cannot connect to the internet, what are the
    7·1 answer
  • A customer dictates instruction on how to transcribe audio. Do you have to transcribe the instruction word for word?
    13·1 answer
  • Fill in the blank
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!