Answer:
3
Explanation:
The sequence seems to follow a 2-step pattern.
1)Divide the first number by 5 to get the second number.
2)Add 10 to the second number to get the third number.
75/5 = 15
15 + 10 = 25
25/5 = 5
5 + 10 = 15
---> 15/5 = [3] (Answer)
Answer:
The answer to this question is given below in this explanation section.
Explanation:
"Why the computer is called diligent
Versatile machine"
Computer is called versatile machine because it is used in almost all the fields for various purposes.Because it can perform the task repeatedly without loosing its speed and accuracy for a long time.They are versatile because they can be used for all sorts of task.They can also do many of the same tasks in different ways.Computer is the electronic device which perform the logical and mathematical calculation.Computer is known as the versatile machine because it is very fast in every field and its part of life without it was cannot imagine life.
It can do the work faster and in every field the computer is used for making their work faster.
It can perform the work fast so it is called versatile machine.
Advantages of versatile machine:
- Computer are very fast due to which thousand of job can be performed within the short period of time.
- Complex mathematical problems and logical operations can be solved by using this computer.
- As computer is versatile device,multiple task like communication,graphics,documentation can be done.
Disadvantages of versatile machine:
- Computers are machine hence they have no brain so they work according to the program instruction set inside it.
- It is an electronic deice and it uses electronic sources to work,So it is very risk to store data and information on the computer independently because some electric and electronic damages may damage the data.So we have to make regular backup of the data.
Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.
Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems or
weaknesses that prevent malicious attacks.
To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer. This was a malicious attack.
However, sometimes people can be specifically targeted to steal their data or monitor their activities.