1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scrat [10]
3 years ago
7

I will give Brainliest to the best answer, I need urgent HELP

Computers and Technology
1 answer:
laila [671]3 years ago
4 0
The answer is B. Range
You might be interested in
Why is linux referred to as open source software?
ss7ja [257]
<span> </span>Linux<span> is a computer operating system, like Microsoft Windows or Apple Mac OS they call it Free </span>Software/Open Source<span>, or Socially Responsible </span>Software<span>. Closely related is the concept of </span>Open Source Software<span>.</span>
7 0
3 years ago
Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr
Viktor [21]

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

4 0
4 years ago
History of computer from difference engine <br>​
harkovskaia [24]

Answer:

Charles Babbage (1791-1871), computer pioneer, designed two classes of engine, Difference Engines, and Analytical Engines. Difference engines are so called because of the mathematical principle on which they are based, namely, the method of finite differences.

Explanation:

4 0
2 years ago
Read 2 more answers
List three reasons you might use hwinfo when troubleshooting and upgrading a computer
Elza [17]

Solution:

three reasons you might use hwinfo when troubleshooting and upgrading a computer are as follows:

1) If we want to identify a hardware component with out opening the case.

2. if we want identify Features of a motherboard, video card, or processor.

3. establish benchmarks for the components in

8 0
3 years ago
What will be the output if the user enters 3​
jenyasd209 [6]

It would be the last statement because 3 is greater than 0 but it does not equal 1 or 2 like the first two statements.

6 0
3 years ago
Other questions:
  • Susie works for an architectural firm and the partners have always drawn the plans for projects by hand. Though Susie learned ho
    8·1 answer
  • A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to sever
    7·1 answer
  • How can you have a safe browser experience
    9·1 answer
  • What does it mean by MYRIAD of data?
    9·1 answer
  • What is the most important for you to choose before you build a network?
    7·1 answer
  • In 2009 to 2010, 1 in 10 social network users:
    10·1 answer
  • The italic button is located on the
    6·1 answer
  • What are the steps to open the Custom AutoFilter dialog box?
    5·2 answers
  • Answer This One Question Right For Brainliest
    10·1 answer
  • EXPLAIN WHY CRYPTOCURRENCIES ARE NOT RELIABLE.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!