1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Taya2010 [7]
3 years ago
13

Describe a way that you can envision using the power of the computer through

Computers and Technology
1 answer:
RideAnS [48]3 years ago
3 0

Answer:

Explanation:

In a way, we can use cryptocurrency as an example. Most cryptocurrencies use distributed computing in a form of decentralization to create an economy/system of information where individuals can transfer money. This ultimately gives back power to the people and puts individual's money back in their own hands. Therefore, getting rid of the banks entirely. This is an enormous enhancement in quality of life and is only one of the many innovations that cryptocurrencies have created.

You might be interested in
You load an image file into a numpy array and look at its shape, which is (433, 650). What does this indicate?
Nat2105 [25]

Answer:

option C

Explanation:

The correct answer is option C

the uploaded image shape is ( 433 , 650 )

this shape means that the image is a grayscale image which is 433 pixels high by 650 pixels wide.

a gray scale image is  in white and black color.

433 pixels high by 650 pixel wide means that the image is formed with the combination of 433 vertical dots and 650 horizontal dots.

Resolution of an image can be found out by the  pixels present in the images.

higher the pixel higher is he resolution of the image.

6 0
2 years ago
A computer supply company is located in a building with three wireless networks.
Sonja [21]

Answer:

A. Rogue access point

Explanation:

A rogue access point is defined as a wireless access point installed on a secure network infrastructure without consent of the owner of the network or without due authorization. While this can sometimes be added by a malicious attacker, it is most commonly set up by employees with the desire to have wireless access even when there is any available.

In the question, there are three wireless networks, but on scanning, five wireless networks were found, hence they are rogue access point.

3 0
3 years ago
If you ping a device, you are using the __________ protocol.
geniusboy [140]
Internet Control Messaging Protocol

If you use the -T switch, it'll be TCP
7 0
3 years ago
Read 2 more answers
The chart shows changes in sea level from 1995 to 2013. According to the chart, sea levels rose at an average annual rate of 3.2
MariettaO [177]

Answer:

Did the global surface temperature increase steadily from 1995 to 2013?

Did sea ice extent in polar regions reduce because of melting from 1995 to 2013?

Explanation:

Only two questions are directly related to global warnings increasing sea levels:

  • Did the global surface temperature increase steadily from 1995 to 2013? Increasing temperature of the Earth's surface is actually what warming means.
  • Did sea ice extent in polar regions reduce because of melting from 1995 to 2013? If the polar ice melts then the sea levels will rise.

The other three questions were about the negative effects of rising sea levels, but not what could cause them.

5 0
3 years ago
Read 2 more answers
I was logging into my origin account and this popped up. I can’t seem to click the NEXT button at the bottom. The blank spaces s
Valentin [98]

Answer:

Contact the company to find out what the problem is.

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • A friend has a CD of one of your favorite artists and has offered to let you copy it.
    8·1 answer
  • The ____________________ packet-filtering firewall allows only a particular packet with a particular source, destination, and po
    10·1 answer
  • What is indentation?
    8·2 answers
  • David uses Office Excel 2013 to calculate his average marks. He enters a formula in cell B5 to calculate the average based on th
    11·1 answer
  • How will you identify a file type on your computer? A file type is the standard used to and information in a computer. All file
    14·2 answers
  • When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing
    12·1 answer
  • In terms of object-oriented programming, after a class is defined,
    11·1 answer
  • At Greenwood ATCT, arrival information need NOT be forwarded while FDIO is operational unless the sequence of aircraft changes a
    6·1 answer
  • If C2=20 and D2=10 what is the result of the function = mathcal I F(C2=D2,^ prime prime Ful "Open")?
    11·1 answer
  • Write the importance of program in computer​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!