1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
4 years ago
9

Whoever understands this first and replies will be the brainliest. Road work ahead?

Computers and Technology
2 answers:
Scorpion4ik [409]4 years ago
7 0

I SURE HOPE IT DOES (this is the best vibe if you dont get this you are an uncultured swine)

alexira [117]4 years ago
4 0

What is there to understand? Are you guys WEEABOOS (aka otaku’s)????!?!

You might be interested in
Compter History Large Resume Include: the beginnings of the computer and its development during the years The events of computer
NikAS [45]

Answer:

The development of computers from the beginning to what we see now is called the computer generations. It is gradual advancement in the technology in the making of the computer.

Explanation:

The generation in computer technology can be defined as the development or the change in the technology in the computer as it was used. There were  five generations of computer development. They were :

1. First Generation computers

   In this generation, vacuum tubes was used in the circuits. It dated from 1946 to 1959.

2. Second Generation computers

  These are transistors based computers. This generation ranges from 1959 to 1965.

3. Third Generation computers  

    This generation computers were Integrated circuit based. The generation stared in 1965 and ended in 1971.

4. Fourth Generation computers

   The computers of this generation used VLSI microprocessor in the circuits. The period of the 4th generation computers are from 1971 to 1980.

5. Fifth Generation computers

   The computers of this generation used ULSI microprocessor in the circuits. The 5th generation computers started from 1980s.

4 0
3 years ago
Why would a business consider using virtual machines?
Nuetrik [128]
The answer is A, or To be able to maintain servers remotely. Why? Well, a business would not want to allow outside customers access to files because that’s a blatant red flag. There would be no reason to completely eliminate physical servers because there simply isn’t a reason to. They would not want to secure the company intranet because if they did, their solution would not be to use virtual machines surely.

Your final answer: To be able to maintain servers remotely. It’s slightly more efficient, and it makes sense for the company to be accomplishing this goal by using virtual machines.
7 0
2 years ago
John works for Internal Computer Specialists, a company that focuses on helping small business owners resolve MIS infrastructure
Romashka-Z-Leto [24]

Answer:

Hardware.

Explanation:

John is operating with Internal Computer Professionals, an organization committed to assisting sector owners to overcome MIS technology problems. John's duties include maintaining and repairing motherboards, wires, and parts of inner devices including DVDs and hard disks. Although John's appointed for hardware fixation.

3 0
3 years ago
Which tag denotes the end of an element in HTML?
goldenfox [79]

Answer:

A. /

Explanation:

When creating a line in HTML, you start with a <ELEMENT> <em>ENTER TEXT</em> </ELEMENT>

Example:

<title> Mark me brainliest! <<u>/</u>title>

<u><em>Hope this helps!</em></u>

<em>-Isa</em>

7 0
3 years ago
IDPSs can also help the organization protect its assets when its networks and systems are still exposed to ____________________
miss Akunina [59]

Answer:

The answer is "Known"

Explanation:

The network security tool also referred to as the IDPSs or Network Prevention Solution (NDPS), all organizations typically use IDPs to assess security concerns, detect security threats.  

  • It avoid breaches of security protocols by individuals, and it may also assist the company in protecting its assets.  
  • When its networks and systems either face security flaws or unable to respond to an evolving environment of risks, and other choices were incorrect because it can't be defined in the question.
3 0
3 years ago
Other questions:
  • Which of these molecules has the same number of shared and unshared electron pairs?CCl2F2Br2HClPF3H2S
    9·2 answers
  • Business ethics are?
    9·1 answer
  • Write a program that reads an unspecified number of integers, determines how many positive and negative values have been read, a
    13·2 answers
  • Why do nonprofit agencies often include blogs on their websites?
    5·1 answer
  • Select all that apply.
    8·1 answer
  • Why does world of tanks keep downloading when I'm not even at the computer
    9·1 answer
  • Explain briefly the purpose of the Computer Management Console in Microsoft Windows.
    12·1 answer
  • To enforce the concept of separating class definition from its function implementations, where should the function implementatio
    14·1 answer
  • Qwertyuytrefgvbhnjkmjhgfvbnmjkuhytgfvbnmjkuyhgnjmkiuyhgbnmkloi<br><br> type pig latin now . . .
    14·2 answers
  • Converting denary no 41 to binar
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!