1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxMikexx [17]
3 years ago
6

Computer __ is any part of the computer that can be seen and touched​

Computers and Technology
1 answer:
iogann1982 [59]3 years ago
3 0
Hardware
Answer. physical parts of computer which can be seen and touched are called Hardware.
You might be interested in
You have a network that uses a logical ring topology. how do messages travel through the network"
RSB [31]
Messages travel from one computer to another until they will find a proper computer to whom that message is addressed.
7 0
3 years ago
Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
diamong [38]

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

7 0
3 years ago
Under which menu option of a word processing program does a star appear?
Citrus2011 [14]

A callout is a type of text box that also includes a line for pointing to any location on the document. A callout appears under the SHAPES <span>menu of the word processing program. The answer that completes this statement is the word "shapes". Hope this answers your question. </span>
3 0
3 years ago
Read 2 more answers
Which technology is used to uniquely identify a wlan network?
expeople1 [14]
The answer is SSID

SSID which in full stands for Service Set Identifier is used to identify a network. It ensures that clients are able to locate a WLAN in which they are attached to. In Layman’s terms, it’s the username or the primary name in a WiFi setup in which a user joins and is connected to.






8 0
3 years ago
If you can't brake to avoid a hazard, you should _____. A. engage your antilock braking system B. accelerate immediately instead
zzz [600]

Answer :  A. Engage your anti lock braking system

Explanation:

If you encounter a situation where you are not able to avoid the hazard then you should engage your anti-lock braking system because anti-lock braking system helps you steer safely by restoring traction to your tires. It helps prevent wheels locking up allowing driver to steer safely.

If you accelerate immediately or set the wheel to cruise control then probability of accident increases. In an attempt to steer around, chances of accident are also more.

8 0
3 years ago
Read 2 more answers
Other questions:
  • A small company connects data acquisition equipment to the serial port of a computer. The equipment user has reported that not a
    8·1 answer
  • In a transaction-processing system (tps), if the tps database can be queried and updated while the transaction is taking place,
    11·1 answer
  • What does CPL stand for
    9·2 answers
  • In which of these scenarios would the top 10 option be most helpful
    10·1 answer
  • Given an integer variable count, write a statement that displays the value of count on the screen. Do not display anything else
    11·1 answer
  • Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
    6·1 answer
  • In which country did the World Cyber Games originate?
    9·2 answers
  • There are some processes that need to be executed. Amount of a load that process causes on a server that runs it, is being repre
    7·1 answer
  • What is processing unit?​
    7·2 answers
  • What is the purpose of a computer virus? O to spread a disease to humans O to substitute for a human disease a O to disrupt a co
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!