1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kompoz [17]
3 years ago
13

computer hardware without software is useless while computer software without hardware is meaningless. explain what do you under

stand by this statement ​
Computers and Technology
1 answer:
Rainbow [258]3 years ago
6 0

Answer:

That the software is useless

Explanation:

You might be interested in
13) An-Excel-file-is-generally called-a-l-an:
anzhelika [568]

Answer:

b) worksheet

Explanation:

An excel file is generally called a worksheet.

5 0
3 years ago
Which of the following is not part of the four ways you can avoid problems with email communication?
UkoKoshka [18]
D you can always find another way or other ways to relay your message 

hope this helps ya :)


3 0
3 years ago
A digital designer might do computer animation or video games true or false
pav-90 [236]

your answer should be TRUE if i’m correct..

MARK ME BRAINLIEST PLEASE IF IM CORRECT

3 0
3 years ago
Read 2 more answers
The expectations I would discuss with Erica regarding the usage of the internet
ryzh [129]

Answer:

Tell her about cyber bullies

Tell her about hackers

stalkers

identity theft

spam

Sorry if wrong

Explanation:

8 0
3 years ago
Write a program that will take an integer and add up each of the number’s digits, count the number of digits in the number, and
Inga [223]
For count digits, you could just convert it to a String and check the length
Sum digits, convert to string then seperate each character with charAt then convert it to numbers in the return statement.
Average digits you can convert it to a String and then convert them back after taking them apart.
5 0
3 years ago
Read 2 more answers
Other questions:
  • In ssl/tls, a specific set of protocols that a particular cryptographic system will use to provide protection is called a ______
    5·1 answer
  • What is the name of the most expensive car and how much is it and what are its features
    15·1 answer
  • How major is the technology problem in the United States?
    15·1 answer
  • Which option describes wearable technology?
    9·1 answer
  • TRUE OR FALSE!!<br> Your location can be identified simply by turning on your cell phone..
    12·2 answers
  • 9. Which of the following is the<br>leading use of computer?​
    13·1 answer
  • You will include code that will validate all user input. If the user inputs an invalid value, the program will respond with an e
    14·1 answer
  • Which of the following is a characteristic of vector graphics?
    15·2 answers
  • You can resize a row in a table by dragging the ____.
    13·1 answer
  • A(n) ____________________ key is a key that is not reused, but rather is only used once, thus improving security by reducing the
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!