Answer:
You could search up almost anything you want
they have a lot of storage
you can find good information
they help you with a lot of things
Explanation:
also how they can process information in seconds
Answer:
B) Keyloggers
Explanation:
Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.
Answer:
EDVAC (Electronic Discrete Variable Automatic Computer) was the successor to ENIAC, was binary based, and used stored programs, and was also designed by Eckert and Mauchly, UNIVAC I (UNIVersal Automatic Computer I) was the first commercial computer. It was designed by the same two men who designed ENIAC and EDVAC.
Explanation:
It could fail, it would take a long time setting it up and aslo it could be easily hacked.