1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ICE Princess25 [194]
3 years ago
11

Our readings so far explored computer hardware and software, in particular operating systems and application software. There are

many kinds of hardware, operating systems, and applications. Do some Internet research or use Basic Search: Google to locate an example of hardware that you might encounter as a business professional in your chosen career path. Share what sort of operating system might run on that hardware and what sort of applications would be installed.
Computers and Technology
1 answer:
lora16 [44]3 years ago
5 0

Answer:

Due to the change in technology, the requirement is changed day to day and business requirements also are changed so we need to opt for new technology.

Explanation:

In old days we started with black and white with DOS (DISK OPERATING SYSTEM ) later we changed to color mode with windows 3.1 and later we are all in an upgraded version of windows 10 and some people will use mac or chrome book as hardware and operating system.

As far as software concern people currently opted with java and angular js and node js. And database also changed from SQL to NoSQL.

Technology has limitation and improvement so fixing to technology is not possible

You might be interested in
50 POINTS How do you express yourself and your creativity through computer science?
Igoryamba

Answer:

1. I express myself through the designing, development and analysis of software and hardware used to solve problems in a variety of business, scientific and social contexts.

2. support the development of general reasoning, problem-solving and communication skills.

3. Through avoiding in repetious tasks and simplifying such works.

3 0
2 years ago
Why might location be important when searching for a job?
Elan Coil [88]
D I think because none of the others seem like very important things, 
8 0
2 years ago
Read 2 more answers
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
2 years ago
Everfi module 7 answers
Nat2105 [25]
What is the question?
7 0
2 years ago
Which of the following is an example of a currency Number format in Excel?
Elena L [17]

$21.08 is an example of a currency Number format in Excel

<u>Explanation:</u>

For items like currency, one can format numbers in cells in Excel.

To view all possible number formats, click the Dialog Box Launcher attached to Number on the Home tab in the Number group.

In the Format Cells dialog box, in the Category list, click Currency or Accounting.

In the Symbol box, tick the currency symbol.

In the Decimal places box, insert the number of decimal places.

Employed for common financial values and presents the default currency figure with quantities.

Ctrl+Shift+$ is a shortcut to represent currency values.

8 0
3 years ago
Other questions:
  • Write an interactive Python calculator program. The program should allow the user to type a mathematical expression, and then pr
    13·1 answer
  • When Web users enter the URL www.CIWcertified.com in their browser address bar, they can access the official CIW Web site at the
    6·2 answers
  • In python:
    14·1 answer
  • The type of database that is connected by a company's local area networks is a(n:
    11·1 answer
  • Security controls are measures taken to protect systems from attacks on the integrity, confidentiality, and availability of the
    12·1 answer
  • The Circle and CircleTester have been created, but they have errors. The public and private settings for variables and methods a
    8·1 answer
  • Please need help.... The system development process is called a cycle. Which of the following may be an ongoing process which su
    6·1 answer
  • ARGENT !!20 POINTS <br> А ________ translates commands from a computer to draw lines on paper.
    10·2 answers
  • What is food technology​
    5·1 answer
  • Identify the calculation performed by the following code.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!