1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
3 years ago
7

What type of computer lies between micro and mainframe computer?

Computers and Technology
1 answer:
avanturin [10]3 years ago
3 0

Answer:

Mini computer lie between micro and mainframe Computer.

Hope it will help you :)

You might be interested in
Thegroup of technologies concerned with the capturing, processing and transmissionof information in the digital electronic form
lorasvet [3.4K]

Answer: Telecom engineering

Explanation:

As, the telecom engineering is the process of capturing, processing and transmission of information in the digital form. Basically, it is responsible for transmission of data by converting the analog signal into the digital form by using various optical fiber tools and electronic service system. It is the type electronic data exchanger by which information is transmitted by using cables or wires.

6 0
3 years ago
Sincerely is an example of a salutation true or false
Setler79 [48]
No, I don't think so.
5 0
3 years ago
Read 2 more answers
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Nostrana [21]

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

5 0
3 years ago
The method of making paper is called p.........
Scorpion4ik [409]

ANSWER:

the answer is pulping

The method of making paper is called pulping

~batmans wife dun dun dun...aka ~serenitybella

4 0
3 years ago
Read 2 more answers
This is science they just dont have the subject buy anyways 
Anna007 [38]
The environment helps us with many many hings thing. The most obvious plants helps us breath and we help them grow because we have the exact opposite breathing pattern. Animals poop almost anywhere they want and farms use it as fertilizer. I hope this enough to help you. Good luck with your work!!<span />
8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following correctly describes the syntax of an If statement?
    9·1 answer
  • If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure stat
    7·1 answer
  • I know how to design it but I’m confused as to how to write a function code based on the info provided.
    10·1 answer
  • For the preceding simple implementation, this execution order would be nonideal for the input matrix; however, applying a loop i
    6·1 answer
  • Create a function called "strip_r_o" that takes in a STRING and strips all the Rs and Os from the string. Also use a FOR loop in
    7·1 answer
  • For each part create a vector n in which the first element is 1, the increment is 1 and the last term is 5, 50, or 5,000. Then u
    13·1 answer
  • Best app in free to learn python
    7·1 answer
  • Consider the following code:
    12·1 answer
  • Write Tic tac toe program in python for beginners pls
    10·1 answer
  • Which type of computer application is apple keynote? a. word processor b. spreadsheet c. presentation d. database e. multimedia
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!