1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
13

A college student needs a laptop that can be used while committing on the train and sitting in a lecture

Computers and Technology
1 answer:
Westkost [7]3 years ago
4 0
You could get a laptop for like 200 that could run well and enough space for stuff.
You might be interested in
Consider that an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker breaks in
pogonyaev
I think the answer is 5 categories but I am not sure
7 0
3 years ago
Surprisingly, many of us may be unknowing victims of botnets. Because of the rising sophistication of botnet schemes, your compu
Virty [35]

Answer:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

C. All the part of a security incident should be logged.

Explanation:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

Explanation:

C. All the part of a security incident should be logged.

7 0
3 years ago
An information system report is an example of...
STatiana [176]

Answer:

a. data processing

b. data collection

c. data input

d. data output

Explanation:

An information system is a system used to filter, process, collect, distribute and create data.

Information system can be a work system whereby humans and machine perform processess using informations gathered, process it to solve the needs of their customers in the form of goods and services.

8 0
4 years ago
How do you add a picture to your questions? (on computer)
Fittoniya [83]

there will be a small picture of a paper clip under your question you click that and you will be able do transfer pictures that you have downloaded. hope this helps!


3 0
4 years ago
. Suppose: x = (1111 1111 1111 1111 1111 1111 1111 1100)2 y = (0011 1011 1001 1010 1000 1010 0000 0000)2 a. Is x bigger than y i
ahrayia [7]

Answer:

a. Using 32bit unsigned binary system, x is bigger than y

b. Using 32 bit signed system, x is not bigger than y.

Explanation:

a.

x = (1111 1111 1111 1111 1111 1111 1111 1100)2

y = (0011 1011 1001 1010 1000 1010 0000 0000)2

In an unsigned system all binary digits are used up as the magnitude bits;

First, we need to convert each number to decimal

x = 4294967292 (decimal)

y = 999983616 (decimal)

4294967292 is greater than 999983616

So, x is greater than y (in 32 bit unsigned binary system)

b.

x = (1111 1111 1111 1111 1111 1111 1111 1100)2

y = (0011 1011 1001 1010 1000 1010 0000 0000)2

In a signed system, the most significant bit is used as the signed bit, the remaining bits are used in representing the magnitude bits;

The most significant bit is always the first bit.

0 represents positive (+)

While

1 represents negative (-)

First we need to separate the most significant bit from the magnitude bits.

So x = 1 (111 1111 1111 1111 1111 1111 1111 1100)2

And y = 0 (011 1011 1001 1010 1000 1010 0000 0000)2

Then, we need to convert each number to decimal

x = -2147483644

y = +999983616

From the above, y is greater than x

4 0
3 years ago
Other questions:
  • 1 what elements of composition are under your control in photoshop
    13·1 answer
  • The most commonly used video formats are the mpeg-____ format, the windows media audio/video format, and the audio visual interl
    12·1 answer
  • Writing a program in a language such as c or java is known as _____ the program.
    10·1 answer
  • Hich of the following usually indicates that there is no moreinput to be read by a program?
    14·1 answer
  • To create a new table by using a select statement, you code the ___________________________ clause.
    14·1 answer
  • Which of the following is not System Software?
    5·1 answer
  • How is video compression accomplished?
    14·1 answer
  • Please help coding assignments i will give brainliest :)
    6·1 answer
  • In a mobile app for computer technicians in a large college, an initial trigger event could be ____.
    7·1 answer
  • What would the theoretical variance (square of the standard deviation) of the following random values be? rand(Normal(80, 10), 2
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!