1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
14

Plz answer these questions...those who give answer get the brainliest......hurry up..!!!​

Computers and Technology
1 answer:
jeyben [28]3 years ago
6 0

39. <u>Microcomputers</u> have a wide range of <u>applications</u> such as in industrial, security, consumer products, telecom, agriculture, transport, commercial, educational, environmental, automotive and medical fields, in addition to others.

40. <u>IBM PC</u>: An IBM PC is especially manufactured as well as sold by the IBM company itself. It could be a Windows or a DOS machine.

<u>IBM Compatible Computer</u>: Also known as IBM clones, or PC clones, IBM compatible computers are almost identical to a computer containing IBM PC architecture. It also uses the same expansion card and very similar software to an IBM PC.

According to the popular American computer magazine called <em>PC Magazine</em>, <em>if a user can plug a disk from an IBM PC into another machine such that it functions adequately, it could be referred to as a PC clone or an IBM compatible computer.</em>

41. On the basis of operations or functioning, computers can be classified into three major types:

  1. Analog computers: These computers are meant to serve specific purposes and use physical values such as temperature and pressure.
  2. Digital computers: These computers are based on the binary system (0 and 1) and is more accurate than analog computers, with additional storage.
  3. Hybrid computers: A combination of both of the above, hybrid computers are complex and designed for special purposes.

You might be interested in
How do I cancel my membership or Subscription on here
timurjin [86]

Answer:

You don't

Explanation:

7 0
3 years ago
What is added to brining liquid to add flavour​
AleksAgata [21]
Wet brining is a technique for seasoning meat by soaking it in a salt solution before cooking. As a general guideline, soak the meat in a solution containing 1 cup of salt per gallon of water. The salt will remain in the meat after cooking, imparting taste, and the liquid will be boiled away.

mark brainiest if helped.
5 0
2 years ago
Which of the following behaviors is considered ethical?
kolezko [41]

Answer:

answer is c. using a limited access public computer to watch movies

7 0
2 years ago
Read 2 more answers
Instance variables are declared private to prevent direct modification. Access to the variables is instead provided through meth
yuradex [85]
<span>Instance variables are declared private to prevent direct modification. Access to the variables is instead provided through methods. This practice is known as.. 
</span><span>c. encapsulation.  It </span><span>is a mechanism of bundling the data (variables) and code acting on the data (methods) together as one.</span>
7 0
3 years ago
Problem 1. MST - Prim's and Kruskal's algorithms
Juli2301 [7.4K]
Or maybe not Encryption converts the data in a database to a format that is indecipherable to unauthorized users who attempt to bypass the DBMS.

a. True
b. False
7 0
3 years ago
Other questions:
  • What type of machine is a CD player? A. simple machine B. compound machine
    8·2 answers
  • Using ajax technologies and apis, websites and applications can pull information from a variety of sources in order to create __
    8·1 answer
  • Ecommerce sites sell this to generate income
    11·1 answer
  • Why does dew form on grass overnight
    7·1 answer
  • Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since th
    15·1 answer
  • An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will
    10·1 answer
  • Write an algorithm and flowchart to calculate sum of two given numbers​
    13·1 answer
  • How is science and technology used in the society​
    11·1 answer
  • You have a host device with an assigned IP address of 192.168.15.100 and a subnet mask of 255.255.255.192. To what network does
    13·1 answer
  • Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!