1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rina8888 [55]
3 years ago
9

To what extent can u justify that computer is not the only ICT tool?​

Computers and Technology
1 answer:
svlad2 [7]3 years ago
3 0

Answer:

well all electronics are

Explanation:

You might be interested in
What are some benefits that each computer system being used?
lisabon 2012 [21]

Answer:

Computerised accounting systems have numerous benefits to them and below are the top nine points as to why you should be using them with your business.

Automation. ...

Data Access. ...

Accuracy. ...

Reliability. ...

Speed. ...

Security. ...

Scalable. ...

Visuals.

Explanation:

hope this helps!

6 0
2 years ago
Read 2 more answers
~ I already know this ~ who was the bits victim in five nights at freddys 4 <br> ___10 points___
Andreas93 [3]

Answer:

i dont know anything about them only that the bear is the ducks son and the duck is the fox mom.

Explanation:

6 0
3 years ago
Read 2 more answers
What is a trojan horse in computer science?
Firdavs [7]

Answer:

type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

Explanation its malware

4 0
2 years ago
Help , i couldn’t find this answer
Aleksandr-060686 [28]

Answer:

Internet Explorer

Explanation:

4 0
3 years ago
The _ and _ services help us to keep in touch with our family and friends<br><br>​
alexira [117]

Answer:

Internet and communication technology

5 0
3 years ago
Other questions:
  • Aubrey didnt like to use graphics or images on her slides. She preferred to use only a title for her slides and bullet-poinged t
    14·2 answers
  • Access controls are enforced automatically in FMS service routines that access and manipulate files and directories.
    9·1 answer
  • In internet terminology, what is the term, .com, called?
    12·2 answers
  • A(n) ________ address is a temporary ip address assigned from an available pool of ip addresses.
    12·1 answer
  • Fair Use means a teacher can take the contents of a web activity page and repost it in your school's web site because it is for
    7·1 answer
  • (PYTHON) Write a program that uses this technique to read a CSV file such as the one given above. Display the IDs and names of t
    14·1 answer
  • You press the F9 key to convert an object to a symbol true or false​
    12·1 answer
  • The software concept ___________and defines a need for the new system.
    6·1 answer
  • To obtain your class E learner license, youll need too _
    9·1 answer
  • What does data warehousing allow organizations to achieve?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!