1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
11

The mainframe computer are the ____ and most ____ computers..​

Computers and Technology
1 answer:
Fittoniya [83]3 years ago
4 0

Answer:

Mainframe computer are the larger system computers and most expensive computer.

You might be interested in
Create a new file that contains a summary of the total consumption for three sectors: "Residential," "Commercial," and "Industri
Lera25 [3.4K]

Answer:idk

Explanation:

8 0
3 years ago
list out the application of the computer and explain it?(and as the answer for this question as image) ​
amid [387]

Answer:

There are several applications of the computer; some of these applications are:

  • Word processors
  • Graphics applications
  • Web browsers
  • Gaming
  • Media players
  • Alarms and tasks schedulers
  • Etc...

Explanation:

The computer system can be applied in various fields (such as medicine, gaming, governments, education, etc.) for various purposes.

Each of these fields require computer software products and/or applications to carry out their activities. I've listed some applications, but there are several other applications.

<em>My explanation could not be submitted; so, I added it as an attachment.</em>

Download txt
3 0
3 years ago
_____ is a method of access control that prevents unauthorized users from using an unattended computer to access the network and
Hoochie [10]

Answer:

Terminal Resource Security

Explanation:

Terminal Resource Security is a type of access control that prevents unwanted user from using a computer that is not in use to access the data and network. It is feature in a software that ensures that the screen of a computer is erased and a user is automatically signed off after a particular length of inactivity. It is used by many organizations.

5 0
3 years ago
IOS jail broken or Android unrooted which is better to hack with
Ira Lisetskai [31]
IOS Jail Broken - that is more advanced then an android
3 0
3 years ago
Whe you read anything online how do you know whether or not is coming from a reliable source?
lorasvet [3.4K]

You can find the author and research his/her credibility

You can cross-reference the information to other documentations

You can investigate the credibility of the overall website or community. Teachers like to say that community sites like wikipedia aren't very reliable.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Retail price data for n = 60 hard disk drives were recently reported in a computer magazine. Three variables were recorded for e
    13·1 answer
  • Special characters that display on the screen but do not print are called _____________
    15·1 answer
  • Explain how a monitor can display the letters that you type on a keyboard. (Hint: Three Basic Computer Functions) *
    11·1 answer
  • Please help thank you !!!
    7·2 answers
  • 3.4 lesson practice quiz edhesive
    11·1 answer
  • I'm lonely every 14 and up come talk
    5·2 answers
  • Core to resource management system is the _________that coordinates the server hardware.
    8·1 answer
  • Consider a computer that uses 5 bits to represent positive integers and uses all 5 bits to represent the value.
    9·1 answer
  • In cell K10, create a formula using the SUM function that calculated the total of the range F17:F20 subtracts it from the value
    5·1 answer
  • (Brainliest!!)<br><br> How do i get rid of a headache?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!