1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
2 years ago
15

What is computer. Write full form of mips​

Computers and Technology
1 answer:
mestny [16]2 years ago
5 0

Answer:

an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

MIPS (Microprocessor without Interlocked Pipelined Stages)

Explanation:

please mark as brainlist answers

You might be interested in
Which of the following is a benefit, as well as a risk, associated with client/server networks?
melomori [17]
A. IT professional, who maintains the network, must be added and removed from the network. - risk 
B. Clients work independently; therefore, if one computer is not working, other computers can still do their jobs.  - benefit (scalability is always a benefit)
C. Security levels are set up by individuals; therefore, these networks may not be as secure. - risk
D. There is no need for a big IT department to keep the network up and running. - benefit (it is simple for maintenance)
7 0
3 years ago
Read 2 more answers
Define types of hacker ? with three to four line of each types?​
Strike441 [17]
1.) benevolent hackers are hackers that use their skills to assist people in getting back stolen information, and usually put bad people in their place
2.) malevolent hackers use their skills to cause harm to others by either stealing information or leaking it, hacking into social media accounts or by infiltrating computers and implanting malware of some kind, but this isn’t normally done by hacking, you can do it just by sending an email with a sneaky link or virus in it.
Those are the two main types but there are also hackers who work for the government as cyber security protection or even to hack into targets of the government.
5 0
2 years ago
What finger should be on the H key?
zavuch27 [327]

Answer:

My knowledge of this is a bit rusty but im pretty sure its your right index finger? Correct me if im wrong. ¯\_(ツ)_/¯

Explanation:

7 0
2 years ago
Read 2 more answers
Write a SELECT statement that returns an XML document that contains all of the invoices in the Invoices table that have more tha
Alina [70]

Answer:

The code is given, paying attention to every column details

Explanation:

columns:

InvoiceNumber

InvoiceDate

InvoiceTotal

InvoiceLineItemDescription

InvoiceLineItemAmount

SELECT InvoiceNumber, InvoiceDate, InvoiceTotal, InvoiceLineItemDescription AS ItemDescription, InvoiceLineItemAmount AS ItemAmount

FROM Invoices AS Invoice JOIN InvoiceLineItems AS LineItem

ON Invoice.InvoiceID = LineItem.InvoiceID

WHERE Invoice.InvoiceID IN (

SELECT InvoiceID

FROM InvoiceLineItems

GROUP BY InvoiceID

HAVING COUNT(*) > 1)

ORDER BY InvoiceDate

FOR XML RAW, ELEMENTS;

7 0
2 years ago
Compare and Contrast the 1977 Freaky Friday and the 2003 Freaky Friday
Nady [450]

Answer:

What do you mean by ?

Explanation:

I can't understand. Please tell clearly.

4 0
3 years ago
Other questions:
  • Is Digital technology always better or should we champion or even return to innovative of analog machines and experiences? Apex
    13·1 answer
  • PLEASE HELP
    8·2 answers
  • In 2-3 sentences, describe a case where circuit-switching is better than packet-switching?
    9·1 answer
  • research the internet and develop a list of three important rules/standards you will give to the team to help everyone easily fi
    13·1 answer
  • 次のうち、ビジネスレターに適したフォントとポイントサイズの選択はどれですか?<br> 私を助けてください!私はあなたを最高にブランコにします!
    12·2 answers
  • Which of the following is true of binary files?
    6·2 answers
  • Having data in a column formatted differently based on value is known as
    7·1 answer
  • How many total bits are required for a direct mapped cache with 16 KB of data and 4 word blocks Assuming a 32 bit address
    12·1 answer
  • Please help asap! i’ll give brainliest to the right answer
    10·1 answer
  • What are the importance of computer software​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!