1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ICE Princess25 [194]
3 years ago
11

Our readings so far explored computer hardware and software, in particular operating systems and application software. There are

many kinds of hardware, operating systems, and applications. Do some Internet research or use Basic Search: Google to locate an example of hardware that you might encounter as a business professional in your chosen career path. Share what sort of operating system might run on that hardware and what sort of applications would be installed.
Computers and Technology
1 answer:
lora16 [44]3 years ago
5 0

Answer:

Due to the change in technology, the requirement is changed day to day and business requirements also are changed so we need to opt for new technology.

Explanation:

In old days we started with black and white with DOS (DISK OPERATING SYSTEM ) later we changed to color mode with windows 3.1 and later we are all in an upgraded version of windows 10 and some people will use mac or chrome book as hardware and operating system.

As far as software concern people currently opted with java and angular js and node js. And database also changed from SQL to NoSQL.

Technology has limitation and improvement so fixing to technology is not possible

You might be interested in
Which of the following is used to encrypt web application data?
babunello [35]

Answer:

b. AES

Explanation:

AES is an acronym for Advanced Encryption Standard and it is a cryptographic or symmetric block cipher that is based on a substitution-permutation network (SPN) used for the encryption of sensitive data over the internet or web. AES uses a key length of 128, 192 or 256 bits and a block length of 128 bits to encrypt data on web applications.

It is an encryption standard of the government of the United States of America and is supported by the National Institute of Standards and Technology (NIST).

Hence, AES is used to encrypt web application data and it uses an algorithm developed by Vincent Rijmen and Joan Daemen, known as the Rijndael algorithm.

3 0
3 years ago
3. Which part of the computer is used<br> for typing?<br> a. Mouse<br> b. Keyboard
tatyana61 [14]

Answer:

B. Keyboard

Explanation:

Stay safe, stay healthy and blessed.

Have a good day!

Thank you

7 0
2 years ago
Read 2 more answers
List two reasons why “buying a computer is no easy task” ?
ValentinkaMS [17]
The price of it and the quality of it.
6 0
3 years ago
Read 2 more answers
What are the advantages of cloud computing over computing on premises?
Verdich [7]

Answer:

answer my question

Explanation:

<h3>open my account. i need help.</h3>
3 0
2 years ago
What does this mean, i am so confused- Explain the importance of identifying the purpose/use for pre-production documents
irina1246 [14]

Answer: These are mostly used in interior design, fashion design, and advertising. they are often used to generate ideas for a client to meet their approval before making the final product. It can help in terms of planning because it could be used to create a design or a theme.

Explanation: yw

4 0
3 years ago
Other questions:
  • How to open CD port in PC lenovo ideapad 330​
    14·1 answer
  • ________ is used to store programs and instructions that are automatically loaded when the computer is turned on.
    14·1 answer
  • A web client is sending a request for a webpage to a web server. from the perspective of the client, what is the correct order o
    14·1 answer
  • A database interrogation is a major benefit of the database management approach, where end users can query (“ask”) the database
    6·1 answer
  • Which of the following actions might contribute to recommendations you see online?
    6·1 answer
  • Networks that are designed to connect similar computers that share data and software with each other are called:
    10·1 answer
  • What emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accel
    15·1 answer
  • For demultiplexing a UDP socket is identified by:_____.
    15·1 answer
  • The _______ within a story are the people and/or objects that the story is about
    5·2 answers
  • Array bounds checking should be directly coded into a system rather than assumed.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!