1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crank
3 years ago
15

Is a pocket watch consider a computer

Computers and Technology
1 answer:
gulaghasi [49]3 years ago
7 0

Answer:

I don't think a pocket watch is considered a computer based off of my logic. Other people may think differently tho.

Explanation:

You might be interested in
Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of acces
tatiyna

The phase of access control that one can say that Ed is more concerned about is called Accountability.

<h3>What is accountability?</h3>

Accountability is known to be one that removes the time and effort you that is used on distracting activities and a lot of unproductive behavior and it makes one to be more focused.

Hence, The phase of access control that one can say that Ed is more concerned about is called Accountability.

Learn more about Accountability from

brainly.com/question/27958508

#SPJ1

7 0
2 years ago
A thermogram taken outside a house shows high amounts of thermal energy around the windows but not around the roof. which conclu
mestny [16]

The conclusion sustains the thermogram will be that the windows are not energy efficient, but the roof stands energy efficient.

<h3>What is Thermography?</h3>

Thermography exists a noninvasive method that employs an infrared camera to develop pictures that depict patterns of heat and blood flow on or around the body's surface. A thermogram taken outside a house shows high quantities of thermal energy around the windows but not around the roof. The conclusion that supports the thermogram will be that the windows are not energy efficient, but the roof exists energy efficient.

Thermal energy (also named heat energy) is produced when a rise in temperature pushes atoms and molecules to move faster and collide with each other. The energy that reaches the temperature of the heated substance is named thermal energy. The term "thermal energy" exists utilized loosely in various contexts in physics and engineering. It can guide several different well-defined physical concepts.

To learn more about Thermography refer to:

brainly.com/question/1500896

#SPJ4

The complete question is,

A thermogram taken outside a house shows high amounts of thermal energy around the windows but not around the roof.

Which conclusion supports the thermogram?

The windows and the roof are energy efficient.

The windows and the roof are not energy efficient.

The windows are not energy efficient, but the roof is energy efficient.

The windows are energy efficient, but the roof is not energy efficient.

4 0
1 year ago
What are some positive impacts technology has on the environment?​
dsp73

Answer:

<u>technology</u> has enabled us to capture useful heat through devices such as solar panels

Explanation:

<h3 />
7 0
3 years ago
Read 2 more answers
35 points please help!
Ahat [919]

Answer:

Microsoft Poweroint

Explanation:

this software helps people to present their projects.

7 0
4 years ago
You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not su
Semenov [28]

Answer:

b) TKIP encryption,e) Preshared key

Explanation:

The parameters that need to be configured on the laptop include the Temporal Key Integrity Protocol (TKIP) and the Preshared key. TKIP is an older wireless protocol that encrypts data at bit level. It is less secure as compared to the Advanced Encryption Standard (AES), AES works well with WPA2 which is not supported by the access point. The preshared key is the access password used on a shared secure channel. It is also used to validate users on the WiFi network. Once the two parameters are configured the laptop will have access to the network

3 0
3 years ago
Other questions:
  • What does the key combination ctrl+s achieve?
    7·2 answers
  • What should a system administrator use to disable access to a custom application for a group of users?
    5·1 answer
  • A tripod head can move vertically or horizontally. What term describes these movements?
    15·2 answers
  • What is good prossesser
    15·2 answers
  • Technician A says that a lead acid battery uses straight Hydrochloric acid for electrolyte. Technician B says that a lead acid b
    10·2 answers
  • When engineers consider _____, they propose giving up a benefit of one proposed design in order to obtain a benefit of a differe
    14·1 answer
  • HELP ASAP <br>please will mark brainliest<br>​
    5·2 answers
  • &lt;BUTTON TYPE="BUTTON" VALUE="SUBMIT"&gt;SUBMIT YOUR FORM&lt;/BUTTON&gt;
    7·1 answer
  • Joe is examining the logs for his web server and discovers that a user sent input to a web application that contained the string
    8·1 answer
  • ____ includes) all tools that capture, store, process, exchange, and use information.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!