1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
3 years ago
12

Outline 3 computer system problem that could harm people and propose the way avoid the problem​

Computers and Technology
1 answer:
Debora [2.8K]3 years ago
6 0

Answer:

<em>outline 3 computer system problem that could harm people and propose the way avoid the problem</em><em> </em><em>a</em><em>r</em><em>e</em><em> </em><em>:</em><em>_</em>

  1. <em>Computer Won't Start. A computer that suddenly shuts off or has difficulty starting up could have a failing power supply. </em>
  2. <em>Abnormally Functioning Operating System or Software. </em>
  3. <em>S</em><em>low Internet.</em>

You might be interested in
Which statement demonstrates a conflict of interest in an organization?
lozanna [386]
C hjhjiiiiiiiiiiijjjiiiio
4 0
3 years ago
Write some positive and negative impacts of computer in our daily life​
8090 [49]
Positive impacts are
1. Communicating with people
2. Daily update of what going on in the world
3. learn new things
Negative impacts are
1. Viruses
2. Private information shared
3. Less face to face conversations
3 0
3 years ago
Most nosql data stores were created to address problems associated with storing large amounts of distributed data in __________.
finlep [7]
NoSQL is primarily designed for supporting the decision making systems. Most NoSQL data stores were created to address problems associated with storing large amounts of distributed data in relational database management systems(RDBMS).
RDBMS is system used for the management of the database.D<span>ata is stored in the form of related tables.</span>
3 0
4 years ago
Differences between placeholders and textbook in PowerPoint ​
Igoryamba

Answer:

fifthly, if it is an empty box. it disappear completely. sixth the size of a text box changes depending on the length of a text that we type . this is in contrast with a place holder box where changes are made of the font of the text

Explanation:

mark me a brainlist

4 0
3 years ago
Design a BCD-to-Gray code decoder. Your decoder will have 4 inputs: A, B, C and D, representing a 4-bit BCD code (A being the MS
ra1l [238]

Answer:

Binary to Gray Code Converter

The logical circuit which converts the binary code to equivalent gray code is known as binary to gray code converter. An n-bit gray code can be obtained by reflecting an n-1 bit code about an axis after 2n-1 rows and putting the MSB (Most Significant Bit) of 0 above the axis and the MSB of 1 below the axis.

The 4 bit binary to gray code conversion table is given in attached file.

3 0
3 years ago
Read 2 more answers
Other questions:
  • How many bits are in 1 tb? [hint: depending on the tool used to calculate this, you may need to use a trick to get the exact res
    6·1 answer
  • Write a program that will use user input. The program should be called PrintNumberToWordie which prints "ONE", "TWO",..., "FIVE"
    9·1 answer
  • What is the total utilization of a circuit-switched network, accommodating five users with equal bandwidth share, and the follow
    5·1 answer
  • Please design a Java GUI application with two JTextField for user to enter the first name and last name. Add two JButtons with a
    9·1 answer
  • PLEASE HELP QUICKLY, I WILL GIVE BRAINLIEST TO THE BEST ANSWER!
    9·1 answer
  • 1) List two hardware methods that can be used to secure data
    11·1 answer
  • Show a parse tree and a leftmost derivation for : B = C * (A + B)
    12·1 answer
  • 1. Give one reason why data is represented in binary in a computer [1]
    10·1 answer
  • What made the digital distribution of both data and visualization more accessible to a broader audience?
    7·1 answer
  • Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a tic
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!