1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
baherus [9]
3 years ago
14

What are potential problems with using nanorobots ?

Computers and Technology
1 answer:
mash [69]3 years ago
5 0
It can penetrate the blood-brain barrier.
You might be interested in
What is the general term for programs used to operate a computer
andre [41]

Answer: SOFTWARE

Explanation: Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It is the opposite of hardware, which describes the physical aspects of a computer. Software is a generic term used to refer to applications, scripts and programs that run on a device.

7 0
3 years ago
If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’
Lynna [10]

Answer:

No, hackers can steal information from cookies. This many times depend on the type of cookies.

Cookies, by general definition, are programs embedded onto browsers which collect non-invasive information about our activities such so that it can adapt to our needs.

The type of information that a cookie collects depends on what type of cookie it is.

Session Cookies: These types of cookies only collect information about the movement of the user on the website such as pages visited, products that were examined (for e-commerce websites) and products/services that the user put in their cart.

These type of cookies are temporary and are deleted as soon as the browser is shut down.

Persistent Cookies:

These do the same thing that the Session cookies do only that they are more permanent and are stored in a text file even after the browser and the computer has been shut down.

It is these types of cookies that pose a threat. These type of cookies many store codes and passwords and log-in details which may be exploited by a hacker.

Cheers!

7 0
3 years ago
after confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of t
Mariana [72]

After confirming the removal of a virus from a computer, the next step is to check for the latest OS patches and updates.

Gathering information from the user and other sources is the first step involved in troubleshooting process.

After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to.

The last step is documenting the issue and solution

Find our more on virus at: brainly.com/question/17395741

5 0
3 years ago
Students at a university are working on a project. the project involves many computing systems working together on disjointed ta
skad [1K]
I think that the form of computing the project would be using is CLUSTER COMPUTING.

It involves a group of linked computers working together that it forms, in essence, a single computer. In this way, each user can work on his or her own tasks all at the same time. This will improve performance, increase output, and it is more cost-effective than using a single computer for the whole project.
8 0
4 years ago
Read 2 more answers
_______ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.
snow_lady [41]

Answer:

C) Computer-aided Design

Explanation:

Options:

a. Computer-aided engineering

b. Computer-aided evaluation

c. Computer-aided design

d. Computer-aided manufacturing

C) Computer-aided design is correct answer

(Hope this helps can I pls have brainlist (crown)☺️)

6 0
3 years ago
Other questions:
  • Harry wants to change the background of all of his presentation slides. Which slide will enable him to make this change to all t
    14·1 answer
  • A computer company has $3840000 in research and development costs. Before accounting for these costs, the net income of the comp
    5·1 answer
  • When completing an application what color ink do you use
    8·2 answers
  • What two windows tools can you use to know how much ram is installed on your system?
    10·1 answer
  • Find the area of the regular hexagon below by using the area formula for triangles.
    7·1 answer
  • Why do we allow electronic instruments to warm-up before use?
    11·1 answer
  • Describe data center technology and its relevance to modern-day cloud computing. Support your opinion with cited information.( S
    14·1 answer
  • What is networking??????????????????????
    8·1 answer
  • With social media presence growing why is cyberbullying at an all time high
    8·2 answers
  • When users connect to the network, they use a basic hardware terminal to access a desktop hosted on a virtualization server. wha
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!