1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marat540 [252]
3 years ago
14

What are the things that a computer literate understands?Name thems.​

Computers and Technology
1 answer:
vitfil [10]3 years ago
4 0

Answer:

•Determine your IP address.

•Verify physical connectivity to the network.

•Check that you have a logical connection to the network.

•Find out what path network traffic takes to get to its destination.

Translate from DNS names to IP addresses.

You might be interested in
What version of ubuntu is linux mint 17.3 based on?
aliina [53]
It would be version 14.04! I run Ubuntu Linux on my pc with dual boot with Kali Linux! I hope this helped!

3 0
3 years ago
What should we do to prevent software piracy?
frozen [14]

Answer:

1. Read the End User License Agreement (EULA) for each software product you purchase.

2. Purchase CD software only from reputable resellers.

3. Purchase software downloads directly from the manufacturer's website.

4. Register your software to prevent others from attempting to install your software on their computers.

5. Report piracy if you discover that software you purchased is not authentic or if you suspect that an online reseller or retail establishment is selling counterfeit software.

Link: https://www.techwalla.com/articles/how-to-stop-software-piracy

-Please mark as brainliest!- Thanks!

7 0
3 years ago
Ning wants to gather data about humidity for a science project. Which of these are needed to gather data?
IgorLugansk [536]

Answer:

A -  information

Explanation:

in the question it says Ning wants to GATHER DATA for the project so, he need information.

IF im wrong, plz tell me and sry if i am

8 0
3 years ago
Read 2 more answers
Write a method getIntVal that will get the correct value input as integer numbers from the user. The input will be validated bas
Setler [38]

Answer:

 import java.util.Scanner;

public class Main

{  

   //Create a Scanner object to be able to get input

   public static Scanner input = new Scanner(System.in);

   

public static void main(String[] args) {

    //Ask the user to enter the lowest and highest values

    System.out.print("Enter the lowest: ");

    int lowest = input.nextInt();

    System.out.print("Enter the highest: ");

    int highest = input.nextInt();

   

    //Call the method with parameters, lowest and highest

    getIntVal(lowest, highest);

}

//getIntVal method

public static void getIntVal(int lowest, int highest){

    //Create a while loop

    while(true){

        //Ask the user to enter the number in the range

        System.out.print("Enter a number between " + lowest + " and " + highest + ": ");

        int number = input.nextInt();

       

        //Check if the number is in the range. If it is, stop the loop

        if(number >= lowest && number <= highest)

            break;

        //If the number is in the range,

        //Check if it is smaller than the lowest. If it is, print a warning message telling the lowest value

       

        if(number < lowest)

            System.out.println("You must enter a number that is greater than or equal to " + lowest);

        //Check if it is greater than the highest. If it is, print a warning message telling the highest value

        else if(number > highest)

            System.out.println("You must enter a number that is smaller than or equal to " + highest);

    }

}

}

Explanation:

*The code is in Java.

You may see the explanation as comments in the code

4 0
3 years ago
Which question would you ask when proposing a private cloud?
Ludmilka [50]
I think the answer would be C :)
5 0
3 years ago
Read 2 more answers
Other questions:
  • Binary code what does this mean I was sick so I don't under stand
    7·2 answers
  • Insecurely attached infants who are left my their mothers in an unfamiliar setting often will
    14·1 answer
  • from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
    13·1 answer
  • Smart art can be used to create _____that highlights relationships betweeen two items
    8·2 answers
  • If a user wants to add an expansion card to increase the memory of a computer, where should the user insert the card?
    12·2 answers
  • Are one of the greatest features of Photoshop that allow nondestructive editing of images.
    6·1 answer
  • Lil fun question : burgers or pizza??
    6·2 answers
  • What subject did this person struggle in, "I ain't never gonna nead to no this stuff."
    11·1 answer
  • How does social network use message to entertain?
    14·1 answer
  • B. Differentiate Operation System from other software. give me 4-5 sentences pls.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!