1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leto [7]
3 years ago
5

What is another word for microchips operating systems input methods and everything in between?

Computers and Technology
1 answer:
lord [1]3 years ago
7 0
The answer is computer. A computer is made up of microchips (CPU and GPU), an operation system (macOS or Windows), input methods (keyboard and mouse), and other parts.
You might be interested in
Research shows that a passive close to a cover letter leads to more interviews. Please select the best answer from the choices p
Alchen [17]
The answer is False.

According to research, a passive close doesn't lead your cover letter to have more interviews. In writing the closing part of your cover letter, it is easy to have a passive sentence but it sounds like less confidence to the employer. The last part of the cover letter should contain strong content to give an impression to the person who reads.
6 0
2 years ago
Read 2 more answers
If you posted an advertisement for your research study on marriage on the Internet and the couples who responded (i.e., the coup
WITCHER [35]

Answer:

B. volunteer bias.

Explanation:

-Experimenter bias is when the expectations of the experimenter in regards to the outcome are communicated to the participants in any form.

-Volunteer bias refers to a situation in which the people that volunteer to take place in a study doesn't represent the general public.

-Research bias is when the experimenter influence the result to get a specific outcome.

-Social desirability bias is when the people taking part in a study give their responses in a way that is viewed as favorable.

According to this, the answer is that the situation would be an example of volunteer bias.

3 0
2 years ago
Karel coding 2.1.4 superkarel cleanup
kherson [118]

Answer:

hi, try using Code Plans

Explanation:

it is a free website that include videos and articles on this stuff

6 0
2 years ago
Read 2 more answers
Which of the following technologies is the best choice to convey urgent and highly sensitive information? telephone fax letter e
snow_lady [41]
Using e-mail to send messages is the best choice to convey urgent and highly sensitive information. E-mail is just a conversation between you and the recipient. So it is the best when it comes to when you are sending a highly sensitive information. While telephone fax letter and dispatch radio may need to use a mediator to transfer messages which violates the confidentiality of the information.
3 0
3 years ago
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Nostrana [21]

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

5 0
3 years ago
Other questions:
  • In the following statement:
    12·1 answer
  • Energy from sources that can be regenerated or reused is called what?
    12·1 answer
  • A car holds 16 gallons of gasoline and can travel 312 miles before refueling. Write aC++ program that calculates the number of m
    9·1 answer
  • Crash proof cars... do you have any idea on how to improve this idea
    13·2 answers
  • The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. For ma
    10·1 answer
  • The WAN connections to your regional offices are unfortunately extremely slow for your users and they are complaining about file
    14·1 answer
  • Pleas help 99 points and get brainliest
    9·2 answers
  • What happens when a string doesn’t include the separator that’s specified in the parameter of the split() method?
    13·1 answer
  • Maria needs to use a requirement-gathering method that will help her provide a set of questions to the client. Which method shou
    11·1 answer
  • Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!