1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
14

Plz answer these questions...those who give answer get the brainliest......hurry up..!!!​

Computers and Technology
1 answer:
jeyben [28]3 years ago
6 0

39. <u>Microcomputers</u> have a wide range of <u>applications</u> such as in industrial, security, consumer products, telecom, agriculture, transport, commercial, educational, environmental, automotive and medical fields, in addition to others.

40. <u>IBM PC</u>: An IBM PC is especially manufactured as well as sold by the IBM company itself. It could be a Windows or a DOS machine.

<u>IBM Compatible Computer</u>: Also known as IBM clones, or PC clones, IBM compatible computers are almost identical to a computer containing IBM PC architecture. It also uses the same expansion card and very similar software to an IBM PC.

According to the popular American computer magazine called <em>PC Magazine</em>, <em>if a user can plug a disk from an IBM PC into another machine such that it functions adequately, it could be referred to as a PC clone or an IBM compatible computer.</em>

41. On the basis of operations or functioning, computers can be classified into three major types:

  1. Analog computers: These computers are meant to serve specific purposes and use physical values such as temperature and pressure.
  2. Digital computers: These computers are based on the binary system (0 and 1) and is more accurate than analog computers, with additional storage.
  3. Hybrid computers: A combination of both of the above, hybrid computers are complex and designed for special purposes.

You might be interested in
A lead views a specific page on your website, say, your case study page. You then send targeted follow-up content like one of yo
IRINA_888 [86]

Answer:

Behavioral Email                                

Explanation:

A behavioral email is an automated email which is sent to recipients on the basis of their behavior. These emails are sent after a user communicates with a business on social media, the company’s website, email, and other communication medium. Behavioral emails help to grow customer involvement and sales. Behavioral email can also be used as a marketing strategy, used by marketers to gather data about an email subscriber in order to send targeted content to that subscriber on the basis of his behavior or actions. When the marketer sends an email to the customer, it is appropriate for that customer, based on the data gathered and their current monitored behavior. Behavioral email helps to understand costumer needs. It helps to get an idea of a customers preferences by inspecting his behavior.

5 0
3 years ago
Hello can you please help with this if you want to thank you!
nikklg [1K]

Answer:

hardware and software is the answer

8 0
3 years ago
Read 2 more answers
Font size means the height of characters.<br>True<br>False​
svlad2 [7]
True..................
8 0
3 years ago
Can the police track a phone if you post something on a social media platform even if the SIM card is out and location services
IgorLugansk [536]
Yes by using the internet address
6 0
3 years ago
Read 2 more answers
Which is a correct statement about having access to technology in a study environment?
Debora [2.8K]
The answer is the 3rd option : Using a computer to research information can be helpful.

Hope this helps!! :)

5 0
3 years ago
Read 2 more answers
Other questions:
  • PLS HELP ASAP! WILL GIVE BRAINLIEST!
    14·1 answer
  • The numbers on the bottom of a typical check represent all of the following EXCEPT?
    12·2 answers
  • Difference between a print device and a printer
    13·1 answer
  • Time complexity: Be sure to show your work. Suppose that a particular algorithm has time complexity T (n) = 10 ∗ 2n, and that ex
    7·1 answer
  • You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy o
    6·1 answer
  • When circuit switching is used, what is the maximum number of circuit-switched users that can be supported?
    7·1 answer
  • Would a hurricane form if the humidity is really high and the breeze is very low
    11·1 answer
  • Describe how operating system use the following security tools: firewall, automatic updating, antivirus software, spyware and ma
    11·1 answer
  • ______ creates a unique and fixed-length signature for a set of data. It involves converting a numerical input into another comp
    15·1 answer
  • someone please do this for and send a screeshot or picture please its really important for my examsss :D​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!