1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
2 years ago
14

An article explaining the uses of the parts of a computer​

Computers and Technology
1 answer:
Luda [366]2 years ago
4 0

Answer:

A infographic article is what you are talking about

You might be interested in
When using bits to represent fractions of a number, can you create all possible fractions? Why or why not?
kumpel [21]

Answer:

The essence including its issue is listed in the interpretation subsection below.

Explanation:

  • Representing means the practice of someone using abstract, tangible as well as pictorial symbols as well as phrases and related circumstances to discuss ideas and express comprehension.
  • Representing fractions could indeed be overcome in almost the same manner as the positive factors of twice represented integers are using the negative factors of two to summarize to essentially fractional amounts.
4 0
3 years ago
What CSS property do you use to determine whether flex items are displayed horizontally or vertically
Hoochie [10]

Answer:

Flex direction

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head.

The head (header) contains information such as version of HTML, title of a page, metadata, link to custom favicons and cascaded style sheet (CSS) etc.

On the other hand, the body of a HTML document contains the contents or informations that a web page displays.

Generally, the part of a HTML document where the cascaded style sheet (CSS) file is linked is the header.

A style sheet can be linked to an HTML document by three (3) main methods and these are;

I. External style.

II. Inline style.

III. Embedded (internal) style.

Flex direction is a CSS property that's used to determine whether flex items are displayed horizontally or vertically.

5 0
3 years ago
Word wrap is the same as __________ return and means you let the ______________ control when it will go to a new line.
dusya [7]

Word wrap is the same as; Soft Return

Word wrap means that you let the; Computer Control when it will go to a new line

<h3>What is Text Wrapping?</h3>

Text wrapping is simply defined as a process used in MS Word to Wrap a Text around an Image.

Now, the way it is done is by selecting the image you want to wrap text around and then On the Format tab, click the Wrap Text command in the Arrange group, then select the desired text wrapping option to wrap the text.

Finally Word wrap is also same as using soft return and letting the computer control when it goes to the next line.

Read more about text wrapping at; brainly.com/question/5625271

5 0
2 years ago
Estimating the cost of a network is ______ complex than estimating the cost of onenew piece of data processing hardware.a.much m
ipn [44]

Answer:

a

Explanation:

your answer is the first one

5 0
3 years ago
What are the most recent attacks on computer security that you face this month? Use the Internet to search for the latest attack
grigory [225]

Answer:

Now a days every thing can be done on the internet easily but this internet has various drawbacks with that as the most of our personal information we share on internet these days so if anyone attacks on your server then he/she can easily access all the private information including financial details and this attack is known as cyber attack. there are various ways to attack on the internet some of them are-

1.Malware- it is shortly known as the malicious software, malware can be described as worms, viruses, trojans these all are variety of malware which provide root access to the attacker by which they can control the system remotely.

2.phising- This is a technique by which the criminals craft emails to fool a target into taking some harmful action. The recipient might be tricked in downloading malware that disguised as an important document for instance or argued toclick on that link that takes them to a fake website where they can get the password which are necessary for any transaction.

3.Ransomware- This is like a malware which is stored in the computer and easily encrypt all the necessary files of the victim's computer and after that they demand some ransom to decrypt it.

4.SQL injection- This is the process by which the SQL command gets injected by the attacker into the victim's system so that the attacker can easily gather all the necessary information which they want to take control on the system.

These attacks are very dangerous for the system because the attacker can get all the necessary information about the user and can easily harm him/her by getting their personal information.

There are various steps to prevent these attacks which are-

I.secure your hardware- The user has to prevent their hardware from lost or steal. protect all devices with a complicated password, share that password with the device user only.

II.Encrypt and backup data- You have to prevent your data by making the backup of the necessary files so that if any of your information gets lost then you can retrieve it from your backup.

III. create a security focused workplace- Employees are the most common ways of breaching of the data as many don't recognise the external threats the internal one breaches the security and it cause the loss of the information.

some latest viruses are-

1.cyborg ransomware-This virus is present in the floppy disk which is used by the user and can cause the count of time the system reboot. it's new variant is present in windows 10.

2.Gobrut-This is also one of the latest viruses it is capable enough to detect weak passwords and can cause loss of information.

3.jokeroo-This virus works as the ransomware their author spread it in the computer system which will encrypt the files and for decrypting it they demand ransom for that.

4.Trojan Glupteba- Once this virus enters the system the user cannot know that the system is infected and it will slowly communicates with the IP of the system which results in loss of the confidential information.

Most vulnerable platforms are-

1.Social engineering- The social networking sites has most of your personal information of the user which can be used by the attacker to get the necessary information.

2.cloud computing services- More companies use to store their most of the information on the cloud which is used by the attacker to get the confidential passwords which can cause loss of the essential information.

Explanation:

6 0
3 years ago
Other questions:
  • Do we have to use intersection?
    6·1 answer
  • Why do many administrators choose to use a command line interface on a Linux server?
    12·1 answer
  • What is the process of comparing data with a set of rules or values to find out if the data is correct?
    8·2 answers
  • Write a function that takes a list as a parameter, converts every element in the list to integar and then returns a tuple compri
    12·1 answer
  • What kind of website uses keywords to locate content?
    15·1 answer
  • Name a piece of software you often use where it is easy to produce an error. Explain ways you could improve the interface to bet
    5·1 answer
  • Allie is working on the development of a web browser and wants to make sure that the browser correctly implements the Hypertext
    7·1 answer
  • A static class method can be accessed without referring to any objects of the class. True False
    7·1 answer
  • How do you suppose a request travels from one computer to another? How does the request know where to go?
    8·1 answer
  • In a black box model are the customers told that they should be expecting to be haxked?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!