1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
3 years ago
7

A customer seeks to buy A new computer for private use at home. The customer primarily needs the computer to use the microsoft p

owerpoint application for the purpose of practising representation skills. As a salesperson what size hard disc would you recommend and why?
Computers and Technology
1 answer:
zavuch27 [327]3 years ago
4 0

Answer:

I think 128GB of storage would be fine.

Explanation:

It sounds like this person he's only looking to do basic tasks as you would still have room to do other things.

You might be interested in
Can you help me in my work
Ilia_Sergeevich [38]

Answer:

Step 1: harvest. First, you need to select the leaves for harvest. ...

Step 2: steaming. The next step is to heat the leaves by steaming them. ...

Step 3: shaping. ...

Step 4: oxidation. ...

Step 5: drying. ...

Step 6: enjoy your cup of home grown tea. ...

Step 7: storing leftover tea leaves.

5 0
2 years ago
What is not an advantage of a computer network?
Nutka1998 [239]

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

4 0
3 years ago
Write the definition of a function typing_speed, that receives two parameters. The first is the number of words that a person ha
m_a_m_a [10]

Answer:

The function code and the formula for the above question is listed below:

Explanation:

Function:

float typing_speed(int Number_of_words, int Time_in_seconds)

{

float time= Time_in_seconds/60;

float speed= Number_of_words/time;

return speed;

}

Formula for this algorithm or program:

Number of words per minute= number of words/ Time(in minutes).

Function Explanation

  • The above function defined in the c-language code, which is used to return the typing speed for any user when he enters the number of words and the time in seconds.
  • The speed is calculated with the help of the above-defined formula.
  • The first statement of the code is used to change the time in a minute.
  • The second statement of the code is used to calculate the speed by the help of speed formula.
  • Then the third statement returns the value of the speed variable.

6 0
3 years ago
Think of the silliest problem the problem solving process could help with.
arlik [135]

Answer:

if 4 slinkies were put down a set of stairs at different times but reached the bottom at the same time. whats the difference?          

Explanation:

5 0
3 years ago
Read 2 more answers
Select the correct answer.
Akimi4 [234]

Answer:

A. Alphanumerical key

Explanation:

pl please give me points

7 0
3 years ago
Other questions:
  • Jake and Sarah have an assignment of writing the history of American independence as a team. They divided their work in hait and
    7·2 answers
  • When a chart is inserted into a Word document, it displays
    15·2 answers
  • Pls help is very urgent and I will mark u as brainliest plsssss​
    11·2 answers
  • List the five body functions that monitor homeostasis.
    7·1 answer
  • LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be
    9·1 answer
  • True or False. A geosynchronous satellite changes its area in the sky each day.
    5·2 answers
  • The intelligence displayed by humans and other animals is termed?
    15·1 answer
  • SOMEONE PLEASE HELP ME OUT WITH!!!!!
    14·2 answers
  • How do you get a blank business card template in word?
    15·1 answer
  • a request for records of features based on their attributes (contained in tables associated with features)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!