1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nlexa [21]
3 years ago
14

What do you think about the future of computers?​

Computers and Technology
1 answer:
Strike441 [17]3 years ago
8 0

Answer:

what do i think about future of computers

Explanation:

i think the future of computer will more be advanced

maybe creating robots to help humans with lots of things as pollution,littering and all sorts of things help us explore deeper parts of the ocean and get more accurate data and maybe be able to stop climate change,maybe stop deforestation, and be able to fix all the horrible thing we did to our earth. this is not proven facts but this is how i think about the future of computer

Idk if that helps

You might be interested in
Interpret the Department of Homeland Security’s mission, operations and responsibilities.
Shalnov [3]

Answer:

 The department of homeland security mission is to provide the efficient and good security system to the nation in all the aspects against the terrorism.

The main aim of the department of homeland security mission is to anticipate fear based oppressor assaults inside the United States, decrease the weakness of the United States to psychological oppression, and limit the harm, and aid the recuperation from psychological oppressor assaults that do happen in the United States.

The main responsibility of this department is that:

  • Providing the security against the threats of terrorism attacks
  • Providing the effective and quick recovery from the disaster
  • Also, give the secured cyber space to the homeland.
7 0
2 years ago
List the five body functions that monitor homeostasis.
IceJOKER [234]
You can also have homeostatis by shivering and sweating

6 0
3 years ago
If you want to encrypt all authorization information as it passes through your network, what could you use?
amid [387]

Answer:

You should use the TACACS+, also known by the term "Terminal Access Controller Access Control System Plus".

Explanation:

This protocol provides users with comprehensive accounting information and an adaptable administrative control over processes like accounting, authorization, and authentication. Clients using the TACACS+ can ask for a comprehensive access control and TACACS+ would do the rest by responding to every of that request's components.

4 0
2 years ago
Eli has 7 games on his phone. His sister has 6 more than him. Which ratio compares the number of games on Eli’s phone to the num
Ulleksa [173]

Answer:

7:13

Explanation:

First figure out how many his sister has so 6+7=13 so the ratio is 7:13 because of how its worded since it says Eli's games first then thats how you get 7 then his sisters 13 so final answer 7:13 There is you answer

6 0
2 years ago
Read 2 more answers
SQLite is a database that comes with Android. Which statements is/are correct?
oksian1 [2.3K]

Answer:

1. Wrong as per my knowledge, SQLite may be an electronic database software that stores data in relations(tables).

2. Wrong. Content provider interface controls the flow of knowledge from your android application to an external data storage location. Data storage is often in any database or maybe it'll be possible to store the info in an SQLite database also.

3.Right. SQLite uses one file to store data. It also creates a rollback file to backup the stored data/logs the transactions.

4. Wrong. The queries are almost like a traditional electronic database system, the queries are going to be answered as per the conditions given and should return a group of answers or one answer depending upon the info and sort of query used.

5. Right. A cursor helps to point to one entry within the database table. this may be very helpful in manipulating the present row of the query easily.

7 0
3 years ago
Other questions:
  • Prompt the user for a string that contains two strings separated by a comma. (1 pt)Examples of strings that can be accepted:Jill
    5·1 answer
  • Internet control message protocol (icmp) is a method of ip address assignment that uses an alternate, public ip address to hide
    7·1 answer
  • I need the answer to the below question *ASAP*
    12·2 answers
  • Anyone have good websites to cure boredom
    10·2 answers
  • PV = 11,000 AC = 6000 CV = 4,000. What is SV? What does this calculation tell you?
    6·1 answer
  • Aspiring graphic designers can earn a(n) certification for graphic design software, such as Photoshop and Acrobat.
    9·2 answers
  • Mary can view the thumbnails of her presentation slides when she’s creating the slides which element of the programs interface i
    8·1 answer
  • Write the Flowchart to find Even number between 1 to 50<br>​
    9·1 answer
  • Besides your computer, where else can you find and use an operating system?
    11·1 answer
  • • R7.9 Write enhanced for loops for the following tasks.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!