1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
meriva
3 years ago
5

Help meee pleaseeee

Computers and Technology
1 answer:
MrMuchimi3 years ago
7 0

Answer:

1. DO, RECEIVE

2. PERFORM

3. STORE, TAKE IN, CALCULATE

4. EXPRESS

5. COMPUTE, DISPLAY

Explanation:

1. A computer DO or RECEIVE data

2. Modern automatic digital computers PERFORM more than 100 mln operations in each second

3. A computer STORE information or data, TAKE IN a sequence of operations on information and CALCULATE answers.

4. The hardware inside the computer EXPRESS arithmetical operations or logical relations

5. When the computers COMPUTE results, they DISPLAY them.

1. DO, RECEIVE

2. PERFORM

3. STORE, TAKE IN, CALCULATE

4. EXPRESS

5. COMPUTE, DISPLAY

You might be interested in
Select the correct answer. Steve wants to change shooting and exposure settings while on his photo shoot. Which camera part will
wel

B. eyepiece

will help you to do that

5 0
3 years ago
Read 2 more answers
The java class library interface queue method tagg retrieves the entey at the front of a queue but themrows a NosuchElementExcep
SCORPION-xisa [38]

Answer:D) peek

Explanation:Peek operation or function is the method that is used for the returning of the values on the front of the queue or stack type datatypes.               This operation function over those datatypes having group or collection of the elements and does not eliminate any element from the queue.

NOsuchElemnet exception is shown when there is the peek operation in the queue for the element to be displayed on the top and no deletion can take place .Thus, the correct option is option(D).

5 0
3 years ago
7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering personal i
beks73 [17]

Answer:

D

Explanation:

Malware can be used for many things, a click of a button can send complete access to the attacking system. Malware comes in all formes and powers.

4 0
3 years ago
Which of the following is true of a bit in data storage?
Trava [24]

Answer:

You didn't give any choice as it looks a multiple choice question

6 0
3 years ago
Which type of portfolio might a young investor who is not afraid of risk choose?
Keith_Richards [23]
i think it would be the investment with high risk and high return such as Stocks.When investing in stock, investor analyze whether a specific company will be doing well in the time of investment (which will increase the market price of the stock) and take a profit from it.
7 0
3 years ago
Other questions:
  • To gain one pound of fat, how many extra calories would you need to consume?
    12·1 answer
  • 7. Which innovation in video games do you think has been most significant? Include at least one way that innovation affects the
    6·1 answer
  • Write a program that lets the user play the game of Rock, Paper, Scissors against the computer. The program should work as follo
    5·1 answer
  • Which is true about lists and stacks?
    8·1 answer
  • How many megapixels is in a macbook air 2017 camera
    10·1 answer
  • Given an initialized variable fileName, write a sequence of statements that create a file whose name is given by the variable an
    15·1 answer
  • Choose all items that represent examples of good website accessibility.
    8·2 answers
  • Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
    12·1 answer
  • The equals method of the Object class returns true only if the two objects being compared:_________
    15·1 answer
  • How do I add a Child to my Brainly account
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!