1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olganol [36]
3 years ago
6

Other than a desktop computer, tablet, or cell phone, discuss two other ways computers are used in our daily lives.​

Computers and Technology
1 answer:
Ket [755]3 years ago
6 0
Well computers are basically everywhere. If u own a thermostat, there is a computer inside of it telling it when to turn on and off you heater or AC. Or even ur coffee maker. There is a little computer inside of it telling it how much coffee to brew (if u have a fancy coffee maker)
You might be interested in
Assume that you are testing the Orders database introduced in Watt (2014) - Appendix C. Discuss the problems and possible conseq
madreJ [45]

Answer:

129 \frac{2}{?} 23.4. \div 164 \times 5y1 + . \\ .00487ggh

6 0
4 years ago
The was the series of events that marked the start of the Information Age
Artyom0805 [142]

The Information Age was the series of events that marked the start of the Information Age

Further Explanation:

I would simply put digital revolution as the gradual shift of technology from analogue to what is now known as digital technology. This sort of a paradigm shift began somewhere between the late 1950s to the late 1970s and has continued to this day. In a span of only 50 years, digital revolution has advanced tremendously and it is yet to start. The Digital Revolution marked the beginning of the Information Age.

The Information Age or the computer age as many would put it is what defines this shift. The invention of transistors, chips and the internet revolutionized the modern world and brought about the birth of information age. It is what connects us to the human civilization. Scientists capitalized on digital micro-miniaturization and as a result formed the Information Age. It is here with us and its sole existence has been embraced by billions of people worldwide.

Learn more about information age

brainly.com/question/10028333

brainly.com/question/10385855

#LearnWithBrainly

7 0
3 years ago
A technician is installing RG6 cable and asks you to retrieve a connector from the parts drawer. What type of connector do you n
Bezzdna [24]

The type of connector, which is needed when a technician is installing RG6 cable and asks to retrieve a connector from the parts drawer, is F-connector.

<h3>What is F-connector?</h3>

The F-connector is a type of RF connector which is used to connect the Video equipments to the antennas and setup box.

A technician is installing RG6 cable.

  • The RG6 cable is a coax cable.
  • This cable is used in satellite signal transmission, generally for TV and setup box.

Now the technician is ask to retrieve a connector from the parts drawer. Here, we use F type connector for this RG6 cable.

Thus, the type of connector, which is needed when a technician is installing RG6 cable and asks to retrieve a connector from the parts drawer, is F-connector.

Learn more about the connector cable here

brainly.com/question/9082842

#SPJ1

4 0
2 years ago
*explain why computer literacy is vital to access in today’s business work
kkurt [141]

Answer:

Computer literacy is vital to access in today’s business work because of advanced technology which ensured that most companies run a computerized system as against the manual one which was existent in the past.

The use of computerized system enables work to be done faster and in a more accurate manner which is why bring a computer literate is widely embraced in the world today.

8 0
3 years ago
Is a mushroom a consumer or a producer or a decomposed
nydimaria [60]
<span>They are decomposers, they breakdown dead plants and animals and release</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • A __________ acts as separate network that rests outside the secure network perimeter so untrusted users can access web servers
    10·1 answer
  • Send me the answers<br>​
    15·1 answer
  • What type of micro sd card is needed for this type of MP3 player? I tried searching it up and a bunch came up. I don’t know whic
    7·1 answer
  • Flash drive DVD and hard drive are all examples of
    6·2 answers
  • <img src="https://tex.z-dn.net/?f=4%2C000%201%20tenth" id="TexFormula1" title="4,000 1 tenth" alt="4,000 1 tenth" align="absmidd
    7·2 answers
  • 8.
    9·1 answer
  • Solve the equation.<br>| 11 X 12362​
    14·1 answer
  • What is computer software? How do you classify them?​
    8·2 answers
  • What ways does e-governance empower citizens
    15·1 answer
  • A ____ risk assessment evaluates threats to and vulnerabilities of the network.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!