1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darina [25.2K]
3 years ago
9

Uses of computer in daily life

Computers and Technology
2 answers:
barxatty [35]3 years ago
7 0

Answer:

Explanation:

to do your homework

write articles , report

play games watching videos

reading books

used to control large and small machines

listening to music, reading the news,

watching TV and movies.

Listening to music.

communicating with other people.

sending e-mail.

using The Internet.

Llana [10]3 years ago
6 0

Answer:

Any individual today can start their business from home. Freelancing is a big example. An organization can use computers for marketing their products. Marketing applications provide information about the products to customers.

Explanation:

You might be interested in
What is the full form of html​
zepelin [54]

Answer:

Hypertext Markup Language

Explanation:

Hypertext Markup Language

5 0
2 years ago
Read 2 more answers
What type of link is used to call this file shown below?
Stells [14]

what file i can't see it

3 0
3 years ago
Traffic flow analysis is classified as which?
Anna35 [415]

Answer:

c. An active attack

d. A passive attack​

Explanation:

Traffic flow analysis is a cyber attack method of acquiring information by intercepting and examining messages so as to decode them by analysing patterns in the way the messages are communicated.

Traffic flow analysis can either be active or passive depending on if the attacker alters communication in the case of active analysis or simply extracts information in case of passive analysis.  

8 0
3 years ago
A Chief Security Officer (CSO) has asked a technician to devise a solution that can detect unauthorized execution privileges fro
VikaD [51]

A solution which would best meet the CSO's requirements is: B. Sandboxing.

<h3>What is a sandbox?</h3>

A sandbox can be defined as an isolated environment in a computer system or on a network that is designed and developed to mimic end user operating system (OS) and environments, so as to detect unauthorized execution privileges from the operating system (OS).

In cybersecurity, sandboxing is typically used to safely execute suspicious code and data files without causing any harm to the host device or network. Also, sandboxing can work in conjunction with proxies or unified threat management (UTM).

Read more on sandboxing here: brainly.com/question/25883753

8 0
2 years ago
System where energy is used to move people is a what system
Travka [436]

Energy is not consumed by motion. And since motion is relative, that means the amount of energy is relative to reference frame.
4 0
2 years ago
Other questions:
  • Choose the reasons why Windows Server operating systems are a popular choice for a network because they _____. Select all that a
    12·1 answer
  • The ________ phase is a technical blueprint for a whole system which captures all aspects of how the system's components will fu
    9·1 answer
  • Anyone wanna play among us UwU code is TAEQPQ
    15·2 answers
  • True or False: <br> The object reference can be used to polymorphically store any class in Java.
    13·1 answer
  • Your it department enforces the use of 128-bit encryption on all company transmissions. your department also protects the compan
    13·1 answer
  • Intel Centrino Technology is the combinatin of wirelesstechnology with the previous HT technology.
    14·1 answer
  • Kevin needs to get his data from a database into a text file to send to another group. He needs to _____.
    12·2 answers
  • Use the function random.randint to write a program that rolls a 6-sided die 100 times, and prints out all of the rolls.
    8·1 answer
  • 4.8 code practice question 2
    10·1 answer
  • Where is information stored in the computer?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!