1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anyanavicka [17]
3 years ago
9

Hey mates.........needed asap 1.) Mention and explain four (4) ICT gadgets,

Computers and Technology
2 answers:
zhenek [66]3 years ago
8 0

Answer:

fax machine

radio set

dispensing machine and

Automatic Teller Machine ATM

Daniel [21]3 years ago
7 0

1. COMPUTERS: A computer is an electronic device for storing and processing data.  Computers come in various types such as:

a) Personal computers

b) Laptops

c) iPad s

2. FAX MACHINE: fax stand for facsimile i.e. make a copy. It is a device that can send or receive pictures and texts over a telephone line.  

3. AUTOMATED TELLER MACHINE: An automatic teller machine (ATM), commonly called cash point is a computerized device that provides the clients of financial institutions access to financial transaction in a public space without the need of a cashier, human clerk or bank teller.

4. DISPENSING MACHINE (A VENDING MACHINE): This is a machine which dispenses items such as snacks, beverages, lottery, tickets, etc to customers automatically.

You might be interested in
Which of the following translates packets so that the node can understand them once they enter through a port?
zubka84 [21]

Answer:

The node translates on its own.

Explanation:

3 0
3 years ago
Read 2 more answers
Which of the following describes the term "false information?"
pav-90 [236]
Inaccurate and misleading
3 0
4 years ago
A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve
MAVERICK [17]

Answer:

The easiest method to clear a DNS cache is to use either the command line, PowerShell or Windows Server's DNS Manager

Explanation:

You can use either the ipconfig /flushdns (command line), Clear-DnsClientCache (PowerShell) or DNS->(name)->Clear Cache (from the DNS Manager)

source:

https://activedirectorypro.com/clear-windows-dns-cache/

https://www.technipages.com/flush-and-reset-the-dns-resolver-cache-using-ipconfig

8 0
3 years ago
Read 2 more answers
What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
kotykmax [81]

Answer:

c. Dark Web                                                

Explanation:

Surface web is also called visible web is a part of world wide web that can be easily searchable using search engines as its contents are indexed by the search engines such as Google and its contents are accessible by public using standard web browsers. So a is not a suitable choice.

Deep Web is called invisible web as it is not accessible or searchable to standard search engines like Google. Search engines cannot index the contents of these sites. However such sites do not requires specialized browsers to access. So b is not a suitable choice.

Dark Web: It is a part of Deep Web sites but it requires specialized software and browsers to access. These sites cannot be indexed and cannot be searchable through standard search engines. This is also called dark side of the world wide web darker which is frequently used by criminals, hackers, black markets, hit-men. Illegal activities on a massive level is takes place in the dark web such as access to stolen sensitive information, malware, drug trade and terrorist operations. These sites are temporary and keep changing addresses to lessen the risk of getting caught by govt agencies or security officials. So c is the suitable choice.

Crypto-Net is a kind of neural network which works with encrypted data which can make a prediction based on the data without disclosing the data and prediction to the 3rd party. So d is not a suitable option.

6 0
3 years ago
Suppose a company A decides to set up a cloud to deliver Software as a Service to its clients through a remote location. Answer
finlep [7]

Answer:

perdonnosee

Explanation:

8 0
3 years ago
Other questions:
  • Which action is LEAST important to maintaining a healthy credit score?
    8·2 answers
  • The second row of letters on the keyboard is called the______ row
    14·2 answers
  • Explain Cascading Style Sheets and what they do. Describe their primary function, two effects that this function has on programm
    11·1 answer
  • . Write a recursive function names factorial to compute the factorial of the parameter. Also write the main function, where you
    15·1 answer
  • When choosing a new computer to buy, you need to be aware of what operating it uses.
    12·1 answer
  • If your TV was showing a flat black or blue screen, or had "snow", what steps would you take to fix it?
    13·1 answer
  • Jason works for a restaurant that serves only organic, local produce. What
    15·2 answers
  • According to the video, what are some concerns of Webmasters? Check all that apply.
    7·2 answers
  • In GD, what does RWR stands for?
    9·1 answer
  • A(n) ________ attempts to slow down or stop a computer system or network by sending repetitive requests for information.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!