1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAXImum [283]
3 years ago
6

Why do you classify computers?

Computers and Technology
1 answer:
aivan3 [116]3 years ago
7 0

What i think the answer answer is because it holds data

You might be interested in
Discuss, in brief thedifferent variations of BLAST. (Maximum 5 innumber)
schepotkina [342]

Answer:

Five variations od BLAST are as following:-

  1. BLASTP
  2. BLASTX
  3. TBLASTX
  4. BLASTN
  5. TBLASTN

Explanation:

BLASTP - Searches a protein database with a protein sequence.

BLASTX - This program searches protein database using a translated nucleotide sequence.

TBLASTX - Searches DNA databases using a protein query.

BLASTN -Searches a nucleotide sequence against DNA database.

TBLASTN - Searches nucleotide sequence to a DNA database.

5 0
4 years ago
Select the correct answer.
GrogVix [38]

Answer:

png or jpg

Explanation:

7 0
3 years ago
A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in t
olga_2 [115]

Answer: Computer's BIOS

Explanation:

Following the information given in the question, the highest level of security that is offered by LoJack can be achieved when Persistence Module resides in the computer's BIOS.

The BIOS (basic input/output system) refers to the program which the microprocessor of a computer uses in starting the computer system when the computer is powered on. It should also be noted that the BIOS is used in managing the data flow that exist between the operating system of the computer and the attached devices like the keyboard, hard disk, mouse, etc.

8 0
3 years ago
Hundreds of a bank’s customers have called the customer service call center to complain that they are receiving text messages on
Aleks [24]

Answer:

Customer enlightenment is the key. The bank should communicate with customers and inform them they never asked them to provide their personal information to such a website or an unknown source. I explain steps to take to avoid such fraudulent text messages. If they have responded to such messages, the bank should also guide the customers on steps to take to recover their stolen money.

Explanation:

Customer enlightenment is the key. The bank should communicate with customers and inform them they never asked them to provide their personal information to such a website or an unknown source. I explain steps to take to avoid such fraudulent text messages. If they have responded to such messages, the bank should also guide the customers on steps to take to recover their stolen money.

Some measures to be taken by both the banks and the customers are as follows;

  • The customers should be careful not to call any number people send to them rather they should get any information they need by going to the bank or search for such information on the bank official websites.
  • Customers should be alert and think carefully before sharing any financial details
  • For customers that responded to such messages, the banks will be proactive enough to shut it down and retrieve the customer's funds the same day.
  • Customers are advised to always report such fraudulent messages when received.
  • Banks should frequently verify transactions through telephone or text messages whenever an unusually high or out of the ordinary payments are flagged by its automated systems.
  • The bank can also prevent this fraud by blocking the customer card whenever an unusual transaction is noticed. The customer will then be contacted to confirm if the transaction was genuine or not. At times the transaction may need to be attempted again.

6 0
3 years ago
2. Assuming that the bits in an integer are numbered from 0, from right (least significant) to left (most significant), write an
3241004551 [841]

Answer:

Explanation:

Two ways of interpreting this question

(I) Shifting all the bits along with the choosen four,

in that case it will be i1>>2;

(ii) Just shifting the choosen four bits and keeping the remaining as it is.

It is equivalent to replacing the first four bits of i1 with i1>>2. let us call N = i1, and M = i1>>2.

max = ~0 //All one's

//1's through position 4, then all zeros

left = max - ((1<<4) - 1);

So we just have zeros between bits one to four and other are one.

Now final step;

(N&left) | m

4 0
3 years ago
Other questions:
  • Assume that a is an array of two or more integers, and that b and c are integers.
    13·1 answer
  • Please help ASAP, will mark brainliest!
    7·1 answer
  • Explain the iterative nature of the database requirements collection, definition, and visualization process.
    14·1 answer
  • For what specific purpose is the TM9400 P25 Mobile designed? What is the benefit of having a mobile communications device that a
    10·1 answer
  • Write down the different types of testing with their definition.
    11·1 answer
  • Cheri's teacher asked her to write a program using the input() function. What will this allow her program to do?
    8·2 answers
  • Which of the following can you use to judge source legitimacy?
    6·2 answers
  • What's this little?<br>​
    9·1 answer
  • During slide show mode, hitting the B key will do which of these things? end your presentation move back one page move to the fi
    15·1 answer
  • Describe s computer network that you are familiar with ?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!