1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serious [3.7K]
3 years ago
8

Please help! 40 points + Brainliest!

Computers and Technology
1 answer:
lbvjy [14]3 years ago
4 0

a pine hole camera is a camera but isnt a modern day camera

You might be interested in
What is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages, many of which contain hoax
Ilya [14]

I think the answer is spam
5 0
2 years ago
Page break preview identifies manual page breaks with a dotted blue line and automatic page breaks with a solid blue line.
Mashutka [201]
Page break preview identifies manual page breaks with a dotted blue line and automatic page breaks with a solid blue line.

a. True
7 0
3 years ago
What is output in computer?​
Goryan [66]

Answer:

An output is data that a computer sends. An input device is something you connect to a computer that sends information into the computer. An output device is something you connect to a computer that has information sent to it.

Output is defined as the act of producing something, the amount of something that is produced or the process in which something is delivered. An example of output is the electricity produced by a power plant. An example of output is producing 1,000 cases of a product.

3 0
3 years ago
Describe how to deploy a website and make it as secure as possible while reducing its resources used
erastova [34]

Answer:

Explanation:

in order to deploy a website, you use these 5 steps, the first step is the preparation step, the second step is to set up DNS record, in step 3 a live testing is set up, in step 4 you set up email accounts while in step 5, you back up and now go live.

in order to secure your website from any threat, malware it hacker it it is necessary to use HTTPS. HTTPS, protects the websites integrity. it also provides data protection as data encryption provides such security. parameterized queries can also be used.

5 0
3 years ago
What is the different between compilers and interpreters?​
ad-work [718]
Compiler transforms code written in a high-level programming language into the machine code, at once, before program runs, whereas an Interpreter coverts each high-level program statement, one by one, into the machine code, during program run. Compiled code runs faster while interpreted code runs slower.
8 0
3 years ago
Other questions:
  • Nadia would like to find text in her current document that differentiates CompanyABC from companyabc. Which option should she us
    8·2 answers
  • To what extent do you think st. cyprian was effective in his efforts to bring inherited christian teachings to bear on the unpre
    10·1 answer
  • ___ are files of related records organized according to logical systems and stored on computer-accessible media.
    5·1 answer
  • In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will
    8·1 answer
  • Lets say if my computer shut down every 10 minutes. What can you do to solve the problem. Hint: Use these word in you answer: ha
    10·2 answers
  • Write an application that displays the strings in the provided array alphabetically in ascending order.
    9·1 answer
  • What are the disadvantages of vector images when compared to bitmap images?
    14·1 answer
  • In Python, the data structure that stores elements of the same data type is called an array.
    6·1 answer
  • An agile team has which two characteristics? (choose two. ).
    10·1 answer
  • Why is technology bad for you
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!