1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
4 years ago
5

What are minimum computer requirements for a software program?

Computers and Technology
1 answer:
Bumek [7]4 years ago
8 0
<span><span>Operating system: Windows 2000/XP
</span><span>CPU: Pentium 4 1.5 GHz or Athlon XP 1500+ processor or higher
</span><span>Memory: 384 MB RAM</span></span>
You might be interested in
think about any special skills or passions you have and describe a way you might apply them to earn money.
liraira [26]

Answer:

The answer to this question is given below in the explanation section

Explanation:

There are different skills or passions that you can use to earn handsome money.

Being a computer student, I have a passion for web development. I have skills in Wordpress, HTML and PHP. I used these skills to develop static and dynamic websites for clients and for companies.

Even, If I will not get a job in some companies and I want to work online according to my own pace and time. I can use freelancing, and doing the online job and providing services to clients online, I can earn more money than doing a traditional job.

7 0
3 years ago
1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
enyata [817]

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

4 0
3 years ago
Explain one rule the company must follow when using cookies on its website.
ololo11 [35]

Explanation:

Work out what cookies your site sets, and what they are used for, with a cookie audit.

Tell your visitors how you use cookies.

Obtain their consent, such as by using Optanon, and give them some control.

7 0
3 years ago
Consider the following method: public double doubleVal(double x) { return x *2; } The following code segment calls the method do
VashaNatasha [74]

Answer:

13.0

Explanation:

The method doubleVal() is created to accept a single parameter of type double.

It multiplies what ever the value of the parameter is and returns the resulting value.

In this question The method is called within this output statement System.out.println(doubleVal(val)); (Note that val had already been declared and assigned the value of 6.5)

The value 6.5 is doubled and outputed to the screen

8 0
3 years ago
List and write at least t computer languages codes
miv72 [106K]
Cobol and python it's some other let me think
3 0
3 years ago
Read 2 more answers
Other questions:
  • Ideation includes all of the following EXCEPT
    5·1 answer
  • A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via root
    6·1 answer
  • Given two int variables, i and j, which have been declared and initialized, and two other int variables, itemp and jtemp, which
    14·1 answer
  • __________ is a website that offers a variety of Internet services from a single, convenient location.
    13·1 answer
  • Verify (valid or not valid) using resolution the following reasoning: "Every student in the SCIS is a CS student or an IT studen
    15·1 answer
  • JPG is considered a lossy file format. What does this mean?
    15·2 answers
  • Software that tries to monitor and track the way you use your computer.​
    10·2 answers
  • What is Mark Dean’s main contribution to the development of the computer?
    9·1 answer
  • Time management is the ability to use time effectively.
    13·2 answers
  • String objects are modified with string slices true or false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!