1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
3 years ago
14

What are the advantages of computer​

Computers and Technology
1 answer:
SOVA2 [1]3 years ago
7 0
Well personally it saves so much time!!

It connects you to the internet, you can FaceTime friends and family and search up anything you need or want and get the answer. It can be used for organization for those who like to keep things neat or to put those important documents in! You also have the ability to create a website and start a business and make a great mount of cash. I mean I can go on and on about the benefits but you get the point
You might be interested in
Explain why an organization's firewall should block outgoing packets the source addresses of which are not in the organization's
Ilya [14]

Answer:

A firewall is used to monitor and control incoming and outgoing (or in better terms, inbound and outbound) traffic in a network based on some pre-defined  security rules set by either an individual or a business.

Now, using firewall to block outgoing packets that have source addresses which are not in an organization's address space means rejecting requests that, though originate from the organization's address space, are not in the organization's allowable address.

This is necessary and of utmost importance because even though an hacker (or simply an attacker) gains access into the organization's network, there is a limit to what harm they can do. If for example, they manage to get some malicious programs into the system's via network processes such as using infected e-mails or using a browser, they might also want to make some requests to the Internet to get some additional programs downloaded which altogether is harmful to the system. Disabling or blocking outgoing packets or traffic will stop this combined hazard from happening.

5 0
3 years ago
Ill give Brainliest!!!!! I REALLYYY NEED HELP
salantis [7]

Answer:

 Topic: Alexander the great

        Alexander was born in July 356 B.C. to Philip II and his wife, Queen Olympias.He was tutored by a philosopher named ‘Aristotle’,he taught Alexander about medicine, philosophy, morals, religion, logic, and art.His full name is ‘Alexander ||| of Macedon’.He died on June 323 B.C and people still don't know how he was killed.A lot of people say that he was killed by poison but nobody really has proof.But despite him being killed he was famous for being the King of Macedonia and conqueror of the Persian Empire. He was a great military leader in fact he is one of the BEST known

6 0
3 years ago
Read 2 more answers
A collision volume is called ____
Phoenix [80]

C IS THE CORRECT ANSWER NOT A I PROMISE ITS REGION!!!

6 0
3 years ago
Select the answers that best describe showing respect for confidential data. Check all of the boxes that
kupik [55]

Answer:

The first (The security administrator makes sure to shred and properly dispose of any printed confidential information) and third (The security administrator uses password-protected files and folders on his work computer.) ones are correct.

3 0
4 years ago
A showChar Method
Lady bird [3.3K]

Answer: so I ask my teacher and this is what he said

Explanation:

4 0
3 years ago
Other questions:
  • Query: [mcdonalds Austin] Viewport: Fresh User Location: within Houston, TX Result Returned: McDonalds location in a neighboring
    7·1 answer
  • Hen pointing to a tool on the ribbon, a ______ appears, displaying information about the tool.
    7·1 answer
  • Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
    7·1 answer
  • When you create an internal hyperlink, you create the link that points to the bookmark using the anchor tag with which attribute
    15·1 answer
  • Contextual targeting method mean
    11·1 answer
  • Explain the four basic operation performed by every computer​
    11·2 answers
  • Which of the following is similar to defense in depth and supports multiple layers of security?a. Defense in depthb. Diversity o
    7·1 answer
  • In an all-integer linear program,
    10·1 answer
  • Through the use of computational thinking techniques, models and algorithms can be created. A(n) ___1___ can be created that rep
    12·2 answers
  • A person is sledding down a hill at a speed of 9 m/s. The hill gets steeper and his speed increases to 18 m/s in 3 sec. What was
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!