1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
3 years ago
8

1. provide at least 3 properties and 3 methods of the object computer.

Computers and Technology
1 answer:
ValentinkaMS [17]3 years ago
7 0

Answer:

The answers to these questions are given below in the explanation section.

Explanation:

The following are 3 properties and 3 methods of the object computer.

Solution

Properties:

  1. computer name;
  2. computer model;
  3. computer color;
  4. computer manufacturer

Methods:

  1. Turn on/off
  2. Do Wordprocessing
  3. Connect Keyboard/Mouse
  4. Charging
  5. Play sound

The following are 3 properties and 3 methods of the object computer.

Properties:

  1. Car Model;
  2. Car Manufacturer;
  3. Car Color

Methods:

  1. Car Run (Speed)
  2. Change Gear
  3. Open/Close Door
  4. Turn on/off

You might be interested in
File-sharing programs such as Napster, Kazaa, and iMesh make it possible for individuals to exchange music files over the Intern
Mashutka [201]

Answer:

Option A) Demand for CDs has decreased, causing equilibrium price and quantity to decrease.

is the correct answer.

Explanation:

  • File-sharing is a common practice nowadays. It helps us by providing access to different files (audio , video, images, documents) to others in a faster way.
  • A wide range of files are shared daily by using different means of file-sharing including computer networks and peer-to-peer networking.
  • Formerly, the data was shared using CDs but now this system has been replaced with the advent of internet.
  • Usage of CDs is dropped drastically and hence their demand is decreased.
  • So now the prices of CDs are not in equilibrium and their quantity is also decreased.

i hope it will help you!

3 0
3 years ago
it says i have brainly plus subscripton but whenever i log onto brainly using my laptop, it says i don't have brainly plus and w
Sladkaya [172]

Answer:

Explanation:

I think you can try logging out from your account. Try cancelling your subscription. Before you do that, reach out to Brainly support.

4 0
3 years ago
How do i build a supercomputer.?
stira [4]
You will need one head node, at least a dozen identical compute nodes, an Ethernet switch, a power distribution unit, and a rack. Determine the electrical demand, cooling and space required. Also decide on what IP address you want for your private networks, what to name the nodes, what software packages you want installed, and what technology you want to provide the parallel computing capabilities
3 0
3 years ago
What is the significant feature of computer capabilities?​
Pepsi [2]
<h2>Hey mate </h2><h2>Here is ur answer..! ⬇️⬇️</h2>

Explanation:

<u>The characteristics of computers that have made them so powerful and universally useful are speed, accuracy, diligence, versatility and storage capacity. Let us discuss them briefly. Computers work at an incredible speed.</u>

<em><u>Hope</u></em><em><u> </u></em><em><u>it helps</u></em><em><u> </u></em><em><u>u plzz</u></em><em><u> </u></em><em><u>mark it</u></em><em><u> </u></em><em><u>as brainalist</u></em><em><u> </u></em><em><u>and thnk</u></em><em><u> </u></em><em><u>my answers</u></em><em><u> </u></em>

4 0
3 years ago
What do you call a firewall that is connected to the internet, the internal network, and the dmz?
Firlakuza [10]
<span>Three-pronged firewall hope this helps!</span>
3 0
3 years ago
Other questions:
  • Where is authorization management app on tablet?
    7·1 answer
  • Given the following class import java.util.ArrayList; public class RectangleTester { public static void main(String[ ] args) { A
    7·1 answer
  • Allows an administrator to query a dns database and find the host name associated with a specific ip address or
    15·1 answer
  • What are the first two lines of defense a company should take when addressing security risks?
    10·1 answer
  • What uses HTML hypertext links that users can click to access different locations or information?
    11·1 answer
  • Mobile phones that function as credit cards are called _____.
    11·1 answer
  • You are configuring two PCs for your network, PC-A is given an IP address of 192.168.1.18 and PC-B is given an IP address of 192
    15·1 answer
  • The appropriate semaphore in C to give one more turn to writer so it can clean up IPC objects is WRITE_SEM. Is it true or false
    5·1 answer
  • Extended essay on globalization not less than 200​
    6·1 answer
  • An electronics company develops a line of augmented reality headsets for use in interactive 3d media applications using 5g mmwav
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!