1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djverab [1.8K]
3 years ago
7

A computer can read whatever you type into it. A)True B)False

Computers and Technology
2 answers:
motikmotik3 years ago
3 0

Answer:

True

Explanation:

Everything typed into a computer is saved as data and logged.

Ksju [112]3 years ago
3 0

Answer:

B   false

Explanation:

I think that is false. (Unless someone is hacking the computer)

You might be interested in
Describe two methods by which viruses can spread.
vlada-n [284]

Answer:

the two methods that can spread viruses are touching and breathing

Explanation:

When there are viruses being spread breathing near another person can caused it to spread because viruses can travel through air. if the viruse is in your systems coming out through the mouth is one way it can travel to another person. That's why wearing a mask is helpful

The other was is touching. Viruses can travel through physical contact. Is hands arent being wash regularly after eating brushing teeth etc it leaves germs and bacteria which is some of the ways and sometimes the main reason as to how viruses are made or created. That's why washing hands are important

Hope's this helps

6 0
2 years ago
_______________involves engineers building up a 3D geometry piece by piece.
zloy xaker [14]

Answer:

<u>Parametric design</u> involves engineers building up a 3D geometry piece by piece. 2D sketches turn into 3D features, with constraints and relations duly applied to fit the designer's intent.

Explanation:

Hope this helps

8 0
3 years ago
Given the following class, public class Magazine { private static double SUBSCRIPTION_DISCOUNT = .60; private String title;
jonny [76]

Answer:

The answer is "III only"

Explanation:

An accessor method is also an instance function that receives or establishes the value of an object's properties. This method is called methods through obtaining information about an entity. This method reverses it to process, which has two accessory string techniques to reach source string data reference length Accessor method.

6 0
3 years ago
When responding to an incident in which explosive materials are suspected, is it safe to use wireless communication devices?
Nataly [62]

Answer:

No

Explanation:

Wireless communication devices like the cell phones transmits signals using radio or electromagnetic wave, which would trigger a bomb. An example of this kind of bomb is the home-made bomb also known as IED (improved explosive device).

The most common type of this IED is the radio controlled IED, which uses electromagnetic wave from a cell phone or a radio controlled type firing circuit. Insurgents, criminals etc, make use of such devices, since the materials are easy to get and are affordable.

8 0
3 years ago
Write down a description of how a magnetic had drive works
Rus_ich [418]

Answer:

This is how a magnetic hard drive works

Explanation:

The hard drive contains a spinning platter with a thin magnetic coating. A "head" moves over the platter, writing 0's and 1's as tiny areas of magnetic North or South on the platter. To read the data back, the head goes to the same spot, notices the North and South spots flying by, and so deduces the stored 0's and 1's.

Hope it helps pls mark as brainliest

5 0
3 years ago
Other questions:
  • All nuclear energy results in the rapid release of energy, such as in atomic bombs. true or false
    8·1 answer
  • C++
    10·2 answers
  • Please someone help!!!!
    15·1 answer
  • Which programming element is used by a game program to track and display score information
    12·2 answers
  • All portions, to include subject, title, paragraphs, sub-paragraphs, graphics, tables, charts, and bullet statements, must be pr
    12·1 answer
  • What is missing in this list of information needed to cite a book?
    7·1 answer
  • Create a two functions: first called grocery_cost(food), where food can be one item or a list of items from the stock and price
    7·1 answer
  • Write a pseudocode that receives a positive number from the user, and then,
    14·1 answer
  • What option can be used by a system administrator to ensure that dynamic updates are made only by known clients when you have a
    8·1 answer
  • What does syntax error mean :-;<br>explain briefly.<br><br>thankyou!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!