1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
3 years ago
8

Which option correctly completes this statement? Programs can repeat simple instructions very quickly to I. help human users to

perceive images and sound II. remove the drudgery of repeating instructions by hand III. overcome the need for connectivity to the computer network
Computers and Technology
1 answer:
inna [77]3 years ago
5 0

Answer:

I, II only

Explanation:

A computer program is a compilation of instructions and commands that can be executed by a computer to carry out a specific task. Most computer devices can only function optimally with the help of a program.

Programs can repeat simple instructions very quickly in order to assist individual users to recognize images and sound effortlessly and to get rid of the drudgery of repeating instructions and commands by hand

You might be interested in
Which formula is a complex formula?<br> =D6/E10<br> =10-(A3-D13)<br> =C3+10+E3<br> =5+A1*B1
GenaCL600 [577]

Answer:

3rd one i think

Explanation:

7 0
3 years ago
Read 2 more answers
What is GND and what color wire do we connect to GND? (this is like for circuits and stuff btw)
fgiga [73]
Ground wire and i believe it is yellow and green
7 0
4 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
You have installed a point-to-point connection using wireless bridges and Omni directional antennas between two buildings. The t
kozerog [31]

Answer and Explanation:

Omnidirectional antenna are those antennas which receives the signals from multiple directions equally.These are the antennas that cannot  get the signal from a particular direction thus gives the low throughput.

To get high throughput, directional antennas should be installed because they receive the signal from a particular direction only .Thus the signal received from these antenna work for a certain area.Example-Television antenna at homes are directional antennas names as Yagi-uda antennas.

3 0
4 years ago
what program searches the Internet for specified keywords and returns a list of the pages where the keywords were found
Andrews [41]

google does that, and yahoo, and bing. it would be a search engine, or browser.

5 0
3 years ago
Other questions:
  • Race conditions are possible in many computer systems. Consider a banking system with two methods: deposit(amount) and withdraw(
    14·1 answer
  • Explain the design and development proccess?
    15·1 answer
  • What is the advantage of using a high-level language over machine language for writing computer programs?
    12·2 answers
  • if your instructors teaching style is very different from your learning preference your best choice is to one work on your weake
    10·1 answer
  • History timeline: who developed what elements first Windows OS and Apple OS?
    13·2 answers
  • Every modern nation has a Central Bank. Which of the following is the Central Bank for these United States?
    14·2 answers
  • Which phrases from the two selections MOST help the reader define the meaning of "captivity"?
    11·2 answers
  • Give a non-network example of hierarchical addressing and discuss how it reduces the amount of work needed in physical delivery.
    10·1 answer
  • What is a network computer that processes requests from a client server​
    11·1 answer
  • Explain how information in an access log could be used to identify the true identity of an impostor who has acquired unauthorize
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!