1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
2 years ago
14

Plz answer these questions...those who give answer get the brainliest......hurry up..!!!​

Computers and Technology
1 answer:
jeyben [28]2 years ago
6 0

39. <u>Microcomputers</u> have a wide range of <u>applications</u> such as in industrial, security, consumer products, telecom, agriculture, transport, commercial, educational, environmental, automotive and medical fields, in addition to others.

40. <u>IBM PC</u>: An IBM PC is especially manufactured as well as sold by the IBM company itself. It could be a Windows or a DOS machine.

<u>IBM Compatible Computer</u>: Also known as IBM clones, or PC clones, IBM compatible computers are almost identical to a computer containing IBM PC architecture. It also uses the same expansion card and very similar software to an IBM PC.

According to the popular American computer magazine called <em>PC Magazine</em>, <em>if a user can plug a disk from an IBM PC into another machine such that it functions adequately, it could be referred to as a PC clone or an IBM compatible computer.</em>

41. On the basis of operations or functioning, computers can be classified into three major types:

  1. Analog computers: These computers are meant to serve specific purposes and use physical values such as temperature and pressure.
  2. Digital computers: These computers are based on the binary system (0 and 1) and is more accurate than analog computers, with additional storage.
  3. Hybrid computers: A combination of both of the above, hybrid computers are complex and designed for special purposes.

You might be interested in
In which generation microprocessor was developed short answer of computer science​
3241004551 [841]

Explanation:

in fourth generation microprocessor was developed.

may it helped u

5 0
3 years ago
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
3 years ago
What’s the name of the technology that lets ryzen™ 5 series cpus access the entire gddr memory of radeon™ rx gpus?.
amid [387]

The name of the technology that lets ryzen™ 5 series cpus access the entire gddr memory of radeon™ rx gpus is AMD Smart Access Memory.

<h3>What is AMD Smart Access Memory?</h3>

AMD Smart Access Memory is known to be a type of memory that helps AMD Ryzen processors to use all their  full power of the graphics card memory.

Conclusively, it is a memory that gives room for a person to combine a Radeon RX 6000 series GPU with the used of a Ryzen processor to make your gaming performance better.

Learn more about AMD Memory from

brainly.com/question/18846925

6 0
2 years ago
Ivy is a student. She is looking for some freelance assignments during her vacation. Which of the following networking sites can
lara [203]

The answer is D. XING


3 0
3 years ago
For the Address Block 195.200.0.0/16 a. If you have 320 Customers that need 128 addresses/customer - will there be enough addres
Shkiper50 [21]

Answer / Explanation:

195.200.0.0/16

Note: Class C address can not be assigned a subnet mask of /16 because class c address has 24 bits assigned for network part.

2ⁿ = number of subnets

where n is additional bits borrowed from the host portion.

2ˣ - 2 = number of hosts

where x represent bits for the host portion.

Assuming we have 195.200.0.0/25

In the last octet, we have one bit for the network

number of subnets  = 2¹  =2 network addresses  

number of host = 2⁷ - 2= 126 network addresses per subnets

8 0
3 years ago
Other questions:
  • Cuales Son las características de la máquina analítica de Carlos Babbage ?
    11·1 answer
  • when two pieces of cui or other unclassified information are posted online together or attached together in an email and result
    5·1 answer
  • Which statement about images is correct? A) A virtual image cannot be formed on a screen. B) A virtual image cannot be viewed by
    12·1 answer
  • Write a couple of paragraph on 'limited government and its important'?​
    7·1 answer
  • What type of engineer is interested in designing, developing, and building different machines, devices, and tools? A.aerospace
    8·2 answers
  • Please help! 40 points + Brainliest!
    8·1 answer
  • List at least 5 professions for people working in the Information/Communication<br> fields.
    10·1 answer
  • Lucia is using the American Psychological Association (APA) style guidelines to writer her research paper. What is her most like
    5·2 answers
  • Type the correct answer in the box
    13·1 answer
  • Henry wants to create a presentation for his clients. He wants to upload the presentation file directly to the Internet. Which p
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!