1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
15

4. Write technical term for the following statements

Computers and Technology
2 answers:
Thepotemich [5.8K]3 years ago
6 0

Answer:

a) Special-purpose computer

b)

c)microcomputers

d) hybrid computer

e) digital computer

f) laptop computers

g) desktop computers.

<h3> <em>Please</em><em> </em><em>mark</em><em> </em><em>me</em><em> </em><em>as</em><em> </em><em>brainlist</em><em> </em><em>:</em><em>)</em></h3>
IRISSAK [1]3 years ago
5 0

A=Application software

C=Microcomputer

D=hybrid computers

E=digital computer

F=Handheld computer

G=Dextop computer

Sorry,i couldn't help you in B.

You might be interested in
"The fact that we could create and manipulate an Account object without knowing its implementation details is called"
ladessa [460]

Answer:

Abstraction

Explanation: Abstraction is a software engineer terminology that has been found to be very effective and efficient especially as it relates to object-oriented computer programming. It has helped software engineers and other computer experts to effectively manage account objects without having a knowledge of the details with regards to the Implementation process of that account object.

6 0
3 years ago
Which of the following are examples of the concept of layered access in physical security? Select one: a. Firewall, IDS, CCTV b.
Tpy6a [65]

Answer:

b. Fences, gates, monitored doors

Explanation:

The best defense is a good defense. A good security system is reliable and will provide you with a criminal-deterrent protection, detect intrusions, and trigger appropriate incident responses. It involves the use of multiple layers  of interdependent systems like protective guards, locks, protective barriers, fences, and many other techniques.

4 0
3 years ago
Read 2 more answers
Use of the internet to access programs and data on computers that’s are owned and managed by the other using large data centers.
Nimfa-mama [501]

Answer:

I just wanna learn how to code

Explanation:

6 0
3 years ago
Hanging out with friends, watching your favorite TV show, and buying a pair of new shoes are all examples of _____ for doing wel
SpyIntel [72]
<span>Hanging out with friends, watching your favorite TV show, and buying a pair of new shoes are all examples of rewards for doing well in school. As the result of doing well in studies, a person can hang out with friends, watch their own favorite TV show and can buy a new pair of shoes. Hence all these things are the rewards that are being generated for a good performance in school.</span>
8 0
3 years ago
Read 2 more answers
Selecting missing puppies 1 # Select the dogs where Age is greater than 2 2 greater_than_2 = mpr [mpr. Age &gt; 2] 3 print(great
anygoal [31]

Answer:

# the dog dataframe has been loaded as mpr

# select the dogs where Age is greater than 2

greater_than_2 = mpr [mpr. age > 2]

print(greater_than_2)

# select the dogs whose status is equal to 'still missing'

still_missing = mpr[mpr. status == 'Still Missing']

print(still_missing)

# select all dogs whose dog breed is not equal to Poodle

not_poodle = mpr [mpr.breed != 'Poodle']

print(not_poodle)

Explanation:

The pandas dataframe is a tabular data structure that holds data in rows and columns like a spreadsheet. It is used for statistical data analysis and visualization.

The three program statements above use python conditional statements and operators to retrieve rows matching a given value or condition.

4 0
2 years ago
Other questions:
  • What does zooming do? A. Changes your view of the Frame Editor to be closer or farther away B. Changes your view of the Event Ed
    12·1 answer
  • Your task in this assignment is to exploit the race condition vulnerability in the above set-uid program. more specifically, you
    14·1 answer
  • Which of the following tends to be true of silent film acting as opposed to sound film acting?
    7·1 answer
  • Three variables, x, y and z, supposedly hold strings of digits, suitable for converting to integers. Write code that converts th
    7·1 answer
  • Which is an example of Raw Input?
    11·1 answer
  • If you do not want to keep a change made by the autocorrect feature, you can click the ____ button on the auto correction option
    12·1 answer
  • The MAC address is a _____ bit number.
    10·2 answers
  • I think you have been doing a great job but you haven’t been signing many people up for our new service feature I want you to se
    8·1 answer
  • write the definition of a class clock. the class has no constructors and one instance variable of type int called hours.
    12·1 answer
  • The principle of ________ strongly suggests that programs should execute with the least amount of privileges needed to complete
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!