1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
3 years ago
7

Early computers took up entire rooms. Which of these dramatically reduced the size of computers?

Computers and Technology
2 answers:
Mrrafil [7]3 years ago
6 0

microchips...get it ? (micro)

hope it helped @!


julsineya [31]3 years ago
4 0
The answer is Microchips
You might be interested in
The editing of digital photos us about the same level of difficulty as editing an analog photo
rjkz [21]

Answer:

does it yes it does

Explanation:

both use the same types of editing softwares

4 0
3 years ago
Which protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication?
amid [387]

The L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

<h3>What is vpn?</h3>

VPN is known as a Virtual Private Network extends a private network across a public network and activates users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

The main difference between VPN proxy and a VPN is encryption and VPNs hides all the web activities performed by the user as well as user's private IP address.

Therefore, the L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

Learn more about VPN here:

brainly.com/question/17272592

#SPJ4

3 0
2 years ago
What is meant by close to 75% of all viruses is contracted through friendly means?
snow_lady [41]

Answer: This means that even though we believe the information is coming from a trusted source, it could still contract a virus due to someone else hacking it or the original sending not being aware of the virus.

Explanation: Just because information comes from a trusted/friendly source does not mean the information is clear of potential threats. Viruses are able to hide in information and the sending may not be aware that the virus is hiding in the information.

4 0
4 years ago
In DTP, a good rule of thumb is to use as many special effects as you need to make your documents look interesting.
Margarita [4]
It all depends back on who youre present it t

younger ages (Primary-Middle),
Its Ok to use plenty of special effects, but dont ovedue your DTP with effects, so that they still can get the point.

Older ages (High & above)
Older people usually more serious than older ages to pursue their careers, so less effect, more points


5 0
3 years ago
Why are peripherals added to computers?
Novay_Z [31]

Answer:

To expand their capabilities

Explanation:

They allow users to do more with computers

7 0
3 years ago
Other questions:
  • Which of the following protocols is used to unsure secure transmissions on port 443?A. HTTPSB. TelnetC. SFTPD. SHTTP
    6·1 answer
  • A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. zombie
    15·1 answer
  • A right turn should be from the right lane into the right lane of the roadway entered. True or false. A. True B. False
    11·1 answer
  • A ______ is a personal computer which stays in one location (e.g. office) due to its larger form factor.
    5·1 answer
  • Which statement accurately compares the restart at 1 and continue numbering featured of word
    15·2 answers
  • Cell phones replacing fixed line phones is an example of:
    12·1 answer
  • Which of these is not the correct method for moving text in a document in Word 2016?
    7·1 answer
  • To obtain the desired speedup, make sure your new function recursively calls itself no more than once in the body of the method.
    8·1 answer
  • write an algorithm and draw a flowchart to calculate the sum of of the first 10 natural numbers starting from 1​
    13·1 answer
  • The cpu stores the results of computations in ________.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!