1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorLugansk [536]
3 years ago
10

How to be fluent in computer

Computers and Technology
2 answers:
Setler79 [48]3 years ago
7 0

Explanation:

1. Seeing people do technological innovations, so you have some motivation and inspiration to be fluent in computer

2. Try experimenting and trying stuff, like trying to learn how to code, how the internet work, etc.

3. work more with computers, for example, make a note with OneNote, making digital art with blender, adobe illustrator etc.

4. Try to learn how to be better at learning computer, like, if you do mistakes in your learning journey, try to avoid it next time

5. good luck ;)

g100num [7]3 years ago
7 0

Answer:

You can always practice or watch videos on how you can become fluent in Computer or ask someone that you know of thats good at Computer

Explanation:

You might be interested in
What is website and what are the difference between website and blog pls anyone​
klemol [59]
A website is a site that contains information for the readers while a blog goes towards followers or viewers
5 0
3 years ago
Read 2 more answers
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
Consider the following two tables where EmployeeNum is primary key in both tables. What is the result of combining the two table
Ilya [14]

Answer:

B) Employee (EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, Street, City, State, PostalCode)

Explanation:

3 0
3 years ago
What software is my teacher using to do this and how can i stop her from doing this
aliina [53]

Answer:

I’m not sure if you can only teachers can acess that

Explanation:

7 0
3 years ago
Read 2 more answers
Trish has bought a new computer, which she plans to start working on after a week. Since Trish has not used computers in the pas
Elenna [48]
Go on the windows sign and type in run and then type temp and %temp% or prefetch
8 0
3 years ago
Read 2 more answers
Other questions:
  • What type of media can be edited and published by anyone?
    6·2 answers
  • In a @return tag statement the description:
    13·2 answers
  • You have been hired by an educational software company to create a program that automatically calculates the sum of each place-v
    15·1 answer
  • Java Question-5 Declare and initialize two variables called first and second. Write a single statement that will print the messa
    15·1 answer
  • 8. Cloud Storage is
    5·2 answers
  • What stage of the development process is often called the pre-alpha phase and is the "meat" of the design process where features
    5·1 answer
  • Why do I keep getting points if I haven't answered anything? I don't want points.
    12·1 answer
  • PYTHON CODING QUESTION
    10·1 answer
  • Which is a guideline for conducting technical reviews?
    12·1 answer
  • What are two advantages of edge computing over cloud computing?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!