1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
3 years ago
12

Computers were originally invented to

Computers and Technology
2 answers:
Afina-wow [57]3 years ago
5 0

Answer:

B

Explanation:

It's B because why would it me made to play video games

MArishka [77]3 years ago
4 0

Answer:

B

Explanation:

A, the internet didnt exist yet, so it cant be this

C, video games would require computers, so its ruled out on a similar basis as the previous

You might be interested in
The rule of thumb in the wireless industry is that a smartphone uses 4 gigabytes of data per month where ____ percent travels th
lianna [129]
I believe the correct answer is 75%. <span>The rule of thumb in the wireless industry is that a smartphone uses 4 gigabytes of data per month where 75% percent travels through wi-fi or 3 gb travels through wi-fi. Hope this answers the question. Have a nice day.</span>
4 0
3 years ago
Read 2 more answers
You have a notebook computer and wish to connect to an IEEE 802.11n wireless network. The computer does not have a built-in wire
Ira Lisetskai [31]

Answer:

The wireless adapter to use is the Wireless USB 2.0 Extender

Explanation:

The Wireless USB 2.0 Extender is a USB component that enables a computer to connect to and communicate with other computers on a network, or even to connect to the internet.

It uses an IEEE 802.11g radio platform and communicates within a radio frequency range of 2.4GHz.

Therefore, in cases where a notebook computer does not have a built-in wireless LAN card or PC card interface, you can use the Wireless USB 2.0 Extender as the best solution to that problem.

3 0
3 years ago
What is the function of a slide transition in a presentation program? A. It enables you to change the presentation layouts. B. I
Allushta [10]

I believe you answer is going to be A.

5 0
3 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Is the intersection of a column and a row
Alex17521 [72]

A Cell hope you enjoy your answer

3 0
2 years ago
Other questions:
  • Gunther is filling in his own input mask. He wants to format the Social Security numbers of his clients. The field must contain
    7·1 answer
  • How does teamwork help in developing a quality outcome?
    7·1 answer
  • Dead state is the name of the time delay in a cpu caused by differences between the speed of the cpu and ram.
    15·1 answer
  • Based on your understanding of Moore’s Law, what do you predict will be the next trend in the evolution of computers?
    10·1 answer
  • A dual looped Fibre Channel drive system is theoretically capable of transferring data at a rate of _____.
    7·1 answer
  • Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the la
    14·1 answer
  • Which term describes the degree to which a network can continue to function despite one or more of its processes or components b
    8·1 answer
  • 4. Use the information under the Nutrients That the Human Body Needs title to create a multilevel list. Your list should meet th
    8·2 answers
  • Which protocol is responsible for transporting files between a client and a server?
    14·2 answers
  • Which of the following is NOT a reason why supply chain infections areconsidered especially dangerous?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!