1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Molodets [167]
3 years ago
14

. What type of device is a computer? Where does it use?​

Computers and Technology
1 answer:
LenKa [72]3 years ago
7 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Computer is an electronic and digital device. Computer can be used everywhere in our daily life. You can use a computer to search for something over the internet related to your study etc.

The following fields where you can see the use of computers.

  1. Education
  2. Business
  3. Hospital
  4. Banking sector
  5. Home
  6. Marketing
  7. Government offices
  8. etc

You can see the use of computers everywhere in our daily life.

You might be interested in
A computer is not connecting to certain network devices properly. the ip address information is as follows: ip address: 192.168.
larisa [96]
192.168 suggests class C networks which have a 24 bit netmask (255.255.255.0) but you haven't provided enough info, like the netmask of a working machine, to be definite.
3 0
3 years ago
The term citizenship means that citizens in a country:
zimovet [89]

Answer:

Its B.

Explanation:

I think

5 0
3 years ago
Pharming involves: setting up fake Wi-Fi access points that look as if they are legitimate public networks. redirecting users to
sweet-ann [11.9K]

Answer:

Explanation:

Pharming involves redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser. An individual can accomplish this by changing the hosts file of the web address that the user is trying to access or by exploiting a DNS server error. Both of which will allow the individual to convince the victim that they are accessing the website that they were trying to access, but instead they have been redirected to a website that looks identical but is owned by the individual. The victim then enters their valuable and private information into the website and the individual can see it all and use it as they wish. Usually, this is done to steal banking information.

7 0
3 years ago
Which of the following voltages from an ESD discharge would be the minimum to short a computer's hardware components?
Vinil7 [7]

Answer:

D. 100 volts

Explanation:

Electrostatic discharge (ESD) can be defined as a swift or sudden discharge of static electricity between two (2) objects coming in contact. An electrostatic discharge occurs between the two objects because the objects are having a different amount of electrons and charge. Thus, when they come in contact it results in a huge buildup of electromagnetic field known as an electrostatic discharge (ESD).

Also, voltages from an electrostatic discharge (ESD) are capable of destroying the internal components of a computer. Generally, a 100 volts ESD would be the minimum to short circuit a computer's hardware components.

Additionally, an electrostatic discharge (ESD) can be prevented through the use of an antistatic wrist strap, antistatic bags etc.

3 0
3 years ago
Encrypted control of remote computers using the RDP protocol is accomplished using what port number?
Romashka-Z-Leto [24]

Answer:

TCP 3389.

Explanation:

Encoded remote access control using the Remote desktop protocol is performed using the following port number.

Windows RDP deploys TCP Port 3389 but also is mostly used by Windows Terminal Server. Within Firewall, every user will still need to enable or allow such port to grant other device control of the user's computer, whether on the specific network or from another network.

4 0
3 years ago
Other questions:
  • Which answer best describes an unsubsidized federal loan
    9·1 answer
  • ‘Bottom of the pyramid’ innovation refers to ancient Egyptian approaches to new product development – true or false?
    8·1 answer
  • Which of the following is considered information?
    6·2 answers
  • #include <iostream>
    9·1 answer
  • According to the ethical computer use policy, users should be __________ of the rules and, by agreeing to use the system on that
    11·1 answer
  • Which of the following best describes the displayport interface used for connecting video monitors to computers
    11·1 answer
  • Cash cows are always in
    7·1 answer
  • Office 365 ProPlus can be deployed to your enterprise. When doing so, which tool enables you to choose the language, hardware ar
    5·1 answer
  • Ajdbksjdnksnsd helppp​
    11·1 answer
  • Fun with Characters
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!