1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korvikt [17]
4 years ago
5

Describe how computer become in the next 35 year

Computers and Technology
1 answer:
marin [14]4 years ago
8 0
Well im going to say that it is going to be more advanced and easier to hack. Not only that but more and more people are going to be using it. You'll see ten year olds and five year olds using computers like they are professionals 
You might be interested in
What does % find on edhesive??
statuscvo [17]

Answer:

Explanation: What is that word you typed?

3 0
3 years ago
Windows service accounts will use passwords consisting of at least
KonstantinChe [14]
<span>Windows service accounts will use passwords consisting of at least 15 characters</span>
7 0
4 years ago
_____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,
Maksim231197 [3]

Answer:

The answer to this question is "Confidentiality".

Explanation:

The answer is Confidentiality because in any computer system many files are important for there user. If the file was deleted, corrupted or stolen from the computer. So the user faces the difficulty to avoid this type of problem computer system provides a technique that is access control or it is also known as Confidentiality. It is a technique that controls who or what type of user's use of resources in a computing environment.

So the answer to this question is Confidentiality.

4 0
3 years ago
1-5 Safety measures in the use of kitchen tools and equipment.​
gladu [14]

Answer:

Safety measures are as follows;

Explanation:

  • Hold the delicate instruments cautiously to use them.
  • Require appropriate use of the equipment in the kitchen.
  • Users should remove these defective instruments or discard of them.
  • During and before use, check that perhaps the resources that will be used are indeed safe.
  • In a cold and dry spot, all equipment must be kept.
4 0
3 years ago
Explain the distinction between a real address and a virtual address.
kap26 [50]

Answer:

<em />

<em>A real address is the physical address in main memory. Though a virtual address is the address of a storage location in virtual memory.</em>

<em></em>

<em></em>

<em>hopes this help (:`</em>

6 0
2 years ago
Read 2 more answers
Other questions:
  • If you are installing separate anti-virus and anti-spyware programs, which should you install first
    7·1 answer
  • How many different Microsoft Windows file types can be infected with a virus?
    10·1 answer
  • Case project 5-1 Network Integration ​
    5·1 answer
  • If the boolean expression a is true and b is false, the value of the logical expression a or b is ________.
    14·1 answer
  • Write a switch statement that tests the value of the char variable response and performs the following actions: if response is y
    9·1 answer
  • In Word, a red wavy underline indicates a/an
    15·1 answer
  • ) The _____ method of a radio button returns true if that button is on.
    13·1 answer
  • Jettison folk 2007, Magnum opus, be moving, offers poisoned commentary on the film industry.
    7·1 answer
  • How do i get around a school related block
    13·2 answers
  • STOP DELETING MY ANSWERS AND QUESTIONS!!!!!!!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!