1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
murzikaleks [220]
3 years ago
15

What is abbreviation of the computer​

Computers and Technology
2 answers:
IRISSAK [1]3 years ago
7 0

Answer:

can u be my bf ....... I love you......

jeyben [28]3 years ago
3 0

Answer:

CPU

Explanation:

Central Processing Unit

You might be interested in
Explain the difference between "sleep mode" and "shutdown "
kari74 [83]

Answer:

When you shut down your electronic, all your open programs close and the electronic shuts down your operating system. An electronic that's shut down uses almost no power. In sleep mode, the electronic enters a low-power state. The electronics state is kept in memory.

5 0
3 years ago
Do you think Google has an unfair advantage as a social media marketing platform? Explain.
Bond [772]
In some aspects, yes but these have recently been outweighed with the ad boycott youtube has not to mention google plus wasn't the most popular, to begin with, but in an overall sense yes as the name google is more often used than Facebook or twitter
3 0
3 years ago
Read 2 more answers
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Nostrana [21]

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

5 0
3 years ago
Cual es la definición de grouded ​
pochemuha

Answer:

ben bilanciato e reattivo.

(di un pilota o di un aeromobile) vietato o impedito di volare.

Explanation:

5 0
3 years ago
Read 2 more answers
I Need Help With This I'm Just At Home Working And I Am Kinda Stuck On This Question Please Help
kvasek [131]

Answer:

move forward 300 pixels and turn right by 15 pixels

repeat then turn left instead of right

do this either 5 or 10 times idk which one

Explanation:

6 0
3 years ago
Other questions:
  • Write the half function. A function call and the functionprototype
    12·1 answer
  • In C, developers may access arrays via bracketed syntax like Java or by using * dereferencing notation. The following assignment
    5·1 answer
  • Which is a characteristic of an effective problem statement? It is based on research. It contains outside information. It contai
    12·1 answer
  • What is the name of the unique identifier assigned to any personal computer that is connected to the internet?
    11·1 answer
  • What Are the Benefits of Using Leads Automation Tool?
    5·1 answer
  • Which of the following BEST describes the relationship between the Boston Marathon bombing and biometrics?
    11·1 answer
  • Quick!! Im taking a timed test so pls hurry!! Ill even mark as brainliets!!
    5·2 answers
  • What read a page on website​
    15·1 answer
  • Why would you browse by entering a URL rather than use a link in a Web page
    15·1 answer
  • Hewo want to talk! #bored<br>Will randomly mark brainlest
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!