1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
14

Plz answer these questions...those who give answer get the brainliest......hurry up..!!!​

Computers and Technology
1 answer:
jeyben [28]3 years ago
6 0

39. <u>Microcomputers</u> have a wide range of <u>applications</u> such as in industrial, security, consumer products, telecom, agriculture, transport, commercial, educational, environmental, automotive and medical fields, in addition to others.

40. <u>IBM PC</u>: An IBM PC is especially manufactured as well as sold by the IBM company itself. It could be a Windows or a DOS machine.

<u>IBM Compatible Computer</u>: Also known as IBM clones, or PC clones, IBM compatible computers are almost identical to a computer containing IBM PC architecture. It also uses the same expansion card and very similar software to an IBM PC.

According to the popular American computer magazine called <em>PC Magazine</em>, <em>if a user can plug a disk from an IBM PC into another machine such that it functions adequately, it could be referred to as a PC clone or an IBM compatible computer.</em>

41. On the basis of operations or functioning, computers can be classified into three major types:

  1. Analog computers: These computers are meant to serve specific purposes and use physical values such as temperature and pressure.
  2. Digital computers: These computers are based on the binary system (0 and 1) and is more accurate than analog computers, with additional storage.
  3. Hybrid computers: A combination of both of the above, hybrid computers are complex and designed for special purposes.

You might be interested in
A friend complains that she is always running out of money even though she “never buys anything expensive.” What advice would yo
Paraphin [41]
To not buy anything unless it is 100% necessary.
4 0
3 years ago
Read 2 more answers
Read the following scenario what type of business letter do you think is required in this situation?
grandymaker [24]

Answer:

Cover letter

Explanation:

The type of business letter Melissa and Melrose would need to write is a Cover letter.

The Cover Letter is usually not more than a page document which gives a kind of summary or hint about who individual is and the quality of the individual, while highlighting why an individual is the best fit for the role they are seeking for.

Most recruiters usually make use of the cover letter, as a first hurdle, to screen out applicants especially when applications are much.

Melissa and Melrose, in addition to the resume they would submit for the volunteering job, would need a cover letter.

8 0
3 years ago
Read 2 more answers
Which is a benefit of owning a desktop computer instead of a laptop?
Setler79 [48]
B) a desktop is less likely to be stolen or damaged
4 0
3 years ago
Read 2 more answers
How should the administrator enable users with permissions to use einstein analytics features
wariber [46]

Answer:

Einstein analytics plus user

Explanation:

Einstein data insights is a platform that can be used by a company to analyse Salesforce report. With a subscription to this platform, an administrator can grant limited access to users in the company and monitor the logs and reports.

To grant a user access to Einstein data insights, go to setup and find permission set on the quick find box, on the "permission set", click on "einstein analytics plus user", then click on "manage assignment | add assignment". Add the users you want and then click on "assign".

4 0
3 years ago
Your boss asks you to transmit a small file that includes sensitive personnel data to a server on the network. The server is run
mel-nik [20]

Answer:

a. Telnet transmissions are not encrypted.

Explanation:

Indeed, since <em>Telnet transmissions are not encrypted,</em> all the information sent, and even the characters typed in the telnet console are sent in clear text.

This is a security issue, since any other device in the same network will receive a copy of the information (packets) sent. For default, all the devices, except for the server expecting to receive the information, will discard the packets. However it is easy to actively <em>listen </em>and keep those packets, wich will contain the information in plain text and human readable.

4 0
3 years ago
Other questions:
  • You are running an application in Google App Engine that is serving production traffic. You want to deploy a risky but necessary
    9·1 answer
  • Software that manages and supports the resources of a computer is known as?
    10·1 answer
  • The init() command initializes the task queue and scheduler data structures. run Next Task() MUST run to completion whatever tas
    9·1 answer
  • The approved systems design document is used by programmers, the personnel department, and information systems personnel.
    8·1 answer
  • You can use Facebook's Live Feed tool to broadcast content as you post it, true or false?
    11·1 answer
  • Which statement is used to create a file object that will append data to an existing file? BufferedWriter salesdata =
    7·2 answers
  • How should a Salesforce Admin fulfill those requirements? Universal Containers launches a Partner Community for their resellers
    13·1 answer
  • How do I write the yearly salary for something without copying it word for word? I'm doing a PowerPoint ( which you had to choos
    15·1 answer
  • Write a static method reOrder56(int[] nums) that return an array that contains exactly the same numbers as the given array, but
    10·1 answer
  • State four input device that are used for playing gaming programs​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!