1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dahasolnce [82]
3 years ago
12

You are studying for a test tomorrow. Your friends invite you to

Computers and Technology
1 answer:
lapo4ka [179]3 years ago
7 0

Answer: C

Explanation:

You might be interested in
MULTIPLE CHOICE QUESTION
Anarel [89]

Answer:

Cheaper price.

Explanation:

It's not cheaper price. Most desktops are pretty expensive.

4 0
2 years ago
Read 2 more answers
Write a two to three sentence response to the following question:
nlexa [21]

Answer:

Functions can be useful for many reasons, it is one of the main components to learn in writing code. Without functions code would not be where it is today.

Explanation:

5 0
2 years ago
8.1.4: Ghost Invasion!
Natalija [7]

the fat car has a lot to pass on PC Dell is the only thing to

8 0
2 years ago
Jacob is a website designer. Whenever his company takes on a new project, Jacob takes the initiative and comes up with ideas and
Troyanec [42]
Eating a potato is what hes using
3 0
2 years ago
why do networking components need more examination from an information security perspective than from a systems development pers
padilas [110]
Networking components will eventually interact with computers and devices outside of itself. Whereas during system development you are only interacting with your program internally.

For example, when you first work on a website you can begin working on it on your personal computer not connected to the outside world. When you are done working on your website you will now upload it to a webserver (or you will create your webserver) and now you are opening up the doors so to speak to the Internet. When you "open the door" you need to make sure the proper security is in place so that no one hacks your site. This is ussually done by making sure the webserver you are on does not have any known security vulnerbilities and has the proper firewall settings to prevent unauthorized access.
4 0
3 years ago
Other questions:
  • All the computers in this type of network are connected to two other computers.
    12·1 answer
  • What do you think about the future of computers?​
    14·1 answer
  • Presently we can solve problem instances of size 30 in 1 minute using algorithm A, which is a algorithm. On the other hand, we w
    8·1 answer
  • Name any four areas where computers are used​
    15·1 answer
  • Write code which takes two inputs from the user, a number of sides followed by a side length, then creates a regular polygon wit
    10·2 answers
  • Circuit pruning occurs only before puberty.<br> O True<br> O False
    9·2 answers
  • What is modularity?
    9·1 answer
  • Why media is far from government​
    6·2 answers
  • Why does a crane need to rotate/swivel​
    9·1 answer
  • consider a pipelined risc cpu with 14 stages. what is maximum speedup of this cpu over a non-pipelined implementation?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!