1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
3 years ago
5

Would you recommend the 4a generations of computers to a friend

Computers and Technology
1 answer:
abruzzese [7]3 years ago
3 0

i don't know it depend of who that person are,

You might be interested in
A firm uses BitLocker for volume encryption. Normally, BitLocker performs its task well. However, an administrator was recently
raketka [301]

Answer:

The BitLocker keys were compromised

Explanation:

Given that the act of decrypting and encrypting all over is a means of troubleshooting the issue of security in computing operations. Hence, when an administrator is forced to decrypt and encrypt the entire volume, the main reason for such action can be as a result of "BitLocker keys were compromised."

Hence, the right answer, in this case, is that "The BitLocker keys were compromised."

3 0
3 years ago
Who is Majira Strawberry??? My Friend said it so i am wondering
otez555 [7]

Answer:

he/ she is a furry

6 0
3 years ago
Read 2 more answers
Computer forensics is practiced _____. A. Only by specially trained government and law-enforcement personnel B. By many organiza
laiz [17]

Answer:

Option B is the correct answer.

<h3>Computer forensics is practiced by many organizations, including public- and private-sector organizations such as hospitals, law enforcement, and businesses. </h3><h3 />

Explanation:

Computer forensics can be defined as a branch of digital forensics that deals with the evidences and and proofs found on all digital storage media such as computers.

It is basically a step for enhancing security bases of communication. Therefore it is mainly used by law-enforcement personnel but it can also be practiced by other institutions for the purpose of self security.

<h3>I hope it will help you!</h3>
4 0
3 years ago
Digital cameras often have trouble with auto white balance, which can result in unattractive blue, orange, or green casts.
mariarad [96]

The statement about digital cameras often having trouble with auto white balance which can result in unattractive blue, orange or green casts is; A: True.

Let us first define white balance(WB).

White balance is defined as the process of removing unrealistic color casts, in a way that will make the objects that appear to be white in person to also be appear white in the photo.

Now, for a camera to have the right white balance, it will have to consider the "color temperature" of a light source i.e the relative warmth of white light.

Finally humans eyes are very good at judging which is white under different light intensities or sources, but that is not the case with digital cameras because they struggle with auto white balance and that could lead to different colors like unattractive blue, orange, or even green color casts.

Read more about Camera pictures at; brainly.com/question/22862481

7 0
3 years ago
Derek’s supervisor is concerned that the company’s security system does not comply with the new standards the company has decide
miv72 [106K]

Answer:

Access Control List is the correct answer to the following question.

Explanation:

The following answer is correct because by the ACL we can access and refusal of services that is controlled. It used to filter traffic for the network and it also used give the extra securities to protect the network. AVL provides an authorization attached to the object that define which persons are allowed for access to the object and operations.

8 0
3 years ago
Other questions:
  • What type of code was Pinterest Pin button created in?
    10·1 answer
  • Im trying to type in answers but where the text box is supposed to be it says unlock answers. What does that mean?
    11·1 answer
  • Kindly answer in Just 7,8 lines please
    7·1 answer
  • Which one of the following provides an authentication mechanism that would be appropriate for pairing with a password to achieve
    13·1 answer
  • You just installed a new application but users cannot connect to the application remotely. Which feature should be checked to en
    14·1 answer
  • Which of the following is an object such as a field which can be inserted into a document
    7·1 answer
  • What is the value of 25 x 103 = ________?
    8·2 answers
  • Question #5
    15·2 answers
  • True or false we can used virus not use pirated software and programs ​
    10·1 answer
  • In java complete a program that takes a weight in kilograms as input, converts the weight to pounds, and then outputs the weight
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!