1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
8

The presentation layer describes the layer where computers interact with _____

Computers and Technology
2 answers:
Dovator [93]3 years ago
5 0
I believe its other computers 
alexdok [17]3 years ago
5 0
The answer is other computers. 
You might be interested in
A key or combination of keys that complete an action more efficiently than using the mouse is called a(n) keyboard shortcut.
andreev551 [17]
The answer to your question is true
6 0
3 years ago
I have a question about a hotel tv:
UNO [17]

1 Open the back cover of the Nintendo Switch Dock.

2 Connect the USB plug from the Nintendo Switch AC adapter (model No. ...

3 Connect one end of the HDMI cable into the bottom terminal of the dock labeled "HDMI OUT," then connect the other end into an HDMI port on your television or monitor.

                                                                                                   your welcome

3 0
3 years ago
How are computers classified into different types? Explain ​
zloy xaker [14]

Answer:

On the basis of size there are four types of computer. They are minicomputer, micro computer, mainframe computer and super computer. Super computer is the fastest, most expensive, big in size, and most powerful computer that can perform multiple tasks within no second.

3 0
2 years ago
Write 3 differences between Virtual reality and Augmented reality
nekit [7.7K]

Answer:

In vr you in a vurtial world

7 0
3 years ago
Read 2 more answers
Different web browsers perform (1)_______ functions, which are presented in the form of (2)__________.
grigory [225]

Answer:

number one is A,

number two is b

5 0
3 years ago
Other questions:
  • What is a partition gap, and how might it be used to hide data?â?
    8·2 answers
  • Select the correct answer.
    8·1 answer
  • Select all that apply. Given the following code fragment, which of the things shown below happen when the statement on line 8 ex
    13·1 answer
  • Which are valid double statements for java? double a = 0; double b = -1.0; double c = -425; double d = 6340; double e = -1.0; do
    12·2 answers
  • WILL UPVOTE ALL plz
    13·1 answer
  • Which of the following should be performed to prove the value of a security awareness training program?
    8·1 answer
  • You are almost finished updating a Website. As part of the update, you have converted all pages from HTML 4.0 to HTML5. The proj
    7·1 answer
  • Write a half page summary on how to clean a Gaming PC properly.
    14·1 answer
  • Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
    12·1 answer
  • Denise found a volume of documents in the trash bin that contained individuals, names, social security numbers and years of birt
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!