1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dalvyx [7]
3 years ago
8

How do i use a computer (i'm 99999 years old)

Computers and Technology
2 answers:
AlekseyPX3 years ago
6 0

Answer:

grandma?

Explanation:

is it you?

Lena [83]3 years ago
5 0

Answer:

you  use the mouse pad and move it already and go to google and search whatever your trying to find

Explanation

i know how to work a computer

You might be interested in
PLEASE HELP!!! What are the benefits of online notebooks? Check all that apply.
Kipish [7]

They allow users to store files.

They allow users to share files.

They help users organize assignments.

They allow users to clip information from web pages.

4 0
3 years ago
Read 2 more answers
Mr. Andrews, the lead programmer for the game New Horizons, hires independent testers to check the game for stability and perfor
NikAS [45]
I think “D”, did I help?
5 0
3 years ago
Read 2 more answers
What does filtering a record do?
Vedmedyk [2.9K]

Answer:

It sorts all the data in record.

Explanation:

third one is verified

3 0
3 years ago
By issuing concert tickets on the blockchain, fans can verify transfer of ownership from one digital wallet to another, rather t
MrRa [10]

Answer:

a. double-cross

Explanation:

 Using the blockchain technology in the case of issuing concert tickets solves the problem with double-cross, which is when someone cheats another person who had trusted in them for some transaction. <em>A great asset with blockchain is the transparency with all the transactions because they are registered and cannot be erased or changed.</em>

3 0
3 years ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Other questions:
  • In poor weather , you should ___ your following distance.
    12·1 answer
  • How to see if your computer has bluetooth?
    6·1 answer
  • Which payment method typically charges the highest interest rates
    15·1 answer
  • A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
    6·1 answer
  • The following is an example of what kind of loop?
    15·2 answers
  • Conceptos importantes de red de computadoras
    11·1 answer
  • Type the correct answer in the box. Spell all words correctly. Complete the sentence based on the role education plays to help y
    5·1 answer
  • PLS HEEELLLP ASAP, DONT JOKE
    9·2 answers
  • The email_list function receives a dictionary, which contains domain names as keys, and a list of users as values. Fill in the b
    14·1 answer
  • What is MVC architecture in relation to developing in web applications? How
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!