1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
4 years ago
7

What will happen if we access all the limitations of computers into it? Just like intelligence, self learning, feeling and other

.​
Computers and Technology
1 answer:
Elis [28]4 years ago
6 0

Answer:

Explanation:At first, in 1635, the evening meetings had been just for women . . .

What relationship between ideas is shown in the text above?

Question 1 options:

Location of events

Similarity of events

Timing of events

Examples of an idea

You might be interested in
What is an advantage of sharing documents in PDF format instead of Word format?
Salsk061 [2.6K]
It is legal document quality
4 0
4 years ago
Read 2 more answers
Which of the following is not a key component of a structure?
Nezavi [6.7K]
Name
I am not sure about it
8 0
3 years ago
You are a network engineer tasked with performing a site survey for a multiple-channel architecture (MCA) system in a three-stor
blagie [28]

Answer:

20/20 vision, and quick internal math if you are talking about human characteristics. If you are talking about the sight survey itself and considering other aspects; You would want to make sure the site has an easily accessible area for the client, doing this by considering the following: easy access, building height (cell phone tower correspondents), multi-channel sight points, and wiring less visible than the access point.

Explanation:

5 0
3 years ago
Maggie is preparing a business report. Which types of keys will she use to type out words and numbers?
nadya68 [22]
She would use enter period comma backspace
Hope this helps u
6 0
3 years ago
Read 2 more answers
Certain files, such as the ____ and Security log in Windows, might lose essential network activity records if power is terminate
Hoochie [10]

Answer:

The answer to this question is a. Event log

Explanation:

Event log in Windows is a comprehensive record of security,system and application notifications stored by the Windows and it is used by administrators to determine problems in the system and foretell issues that going to happen in future.

Operating system and the Apps use event logs to keep account of important software and hardware activity that administrator can use to correct issues with the operating system.

7 0
3 years ago
Other questions:
  • With which type of media are you interacting when you read an online shopping website?
    7·1 answer
  • Hosts A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Sup
    10·1 answer
  • Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network.
    13·1 answer
  • Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appro
    9·1 answer
  • A row in a table _____? for computer class and i’m in the middle of a test!
    14·1 answer
  • Who plays xbox one offline and knows some multiplayer games that can be played offline.
    15·2 answers
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
  • 1. Give one reason why data is represented in binary in a computer [1]
    10·1 answer
  • assume there are K sorted lists, each of n/k elements. We want to merge them into a single sorted list of n elements. Give an op
    7·1 answer
  • I need help NOW with my java script!! 1. What will the code below output to the console and why? const person = {
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!