1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
2 years ago
13

Trading stock or selling stock, selling real estate for profit, and selling other assets that gain value over time.

Computers and Technology
1 answer:
Andrei [34K]2 years ago
3 0

Answer:

D is reasonable

Explanation:

You might be interested in
Written and artistic expressions are protected by
MAXImum [283]
I believe the word you are looking for is "Copyright".
3 0
3 years ago
Can you plug a usb 2.0 into a 3.0 port on your computer
Arte-miy333 [17]
If you are plugging in something that uses USB 2.0 into a USB 3.0 port, then yes you can, as the port is backwards compatible. Although, you will only get USB 2.0 speeds.
8 0
2 years ago
____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast
Mariulka [41]

Answer:

Smurf

Explanation:

The use of automated program smurf in exploiting Internet Protocol(IP) is called smurfing. When the attackers uses this program the part of a network which is attacked becomes unusable.

You can counter smurfing by disabling IP broadcast addressing at every network router.

So we conclude that the answer is Smurf.

5 0
2 years ago
(C) Describe about the different types of computer<br> peripherals and memory devices.
Alecsey [184]

<em>Computer peripheral device</em>

<em> Monitor.</em>

<em> Monitor. Keyboard.</em>

<em> Monitor. Keyboard. Mouse.</em>

<em> Monitor. Keyboard. Mouse. Trackball.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick. Joystick.</em>

<em> Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick. Joystick. Light pen.</em>

<em> </em><em>MEMORY </em><em>DEVICES </em><em>:</em><em> </em>

<em> </em><em> </em><em> </em><em>The main storage is the primary memory, and data and programs are stored in secondary memory. However, memory is not stored in the CPU, but the CPU would only be a mess of wires without it!</em>

<em>RAM (Random Access Memory) and ROM (Read Only Memory) are examples of primary storage. Secondary Storage Devices: Secondary storage is a memory that is stored external to the computer. ... Hard Disk, CD, DVD, Pen/Flash drive, SSD, etc, are examples of secondary storage.</em>

<em>Thus</em><em>, </em><em> </em><em>Computer storage is of two types: ... RAM (Random Access Memory) and ROM (Read Only Memory) are examples of primary storage. Secondary Storage Devices: Secondary storage is a memory that is stored external to the computer. It is mainly used for the permanent and long-term storage of programs and data.</em>

3 0
2 years ago
Which types of operating systems execute program independent of the users and generate output within a specific amount of time?
soldi70 [24.7K]
Real-Time Operating System –
These types of OSs serves the real-time systems. The time interval required to process and respond to inputs is very small. This time interval is called response time.

Real-time systems are used when there are time requirements are very strict like missile systems, air traffic control systems, robots etc.

https://www.geeksforgeeks.org/operating-system-types-operating-systems-awaiting-author/
3 0
2 years ago
Other questions:
  • Marcus just created a new folder specifically for his buisness records so he would like to move last months business transaction
    13·2 answers
  • What is the purpose of a scatter plot introduction to computer applications
    6·2 answers
  • Heather has segmented all of the individuals in her database into four categories according to how many game tickets they purcha
    12·2 answers
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • Write a program that lets the user enter a nonnegative integer then uses a loop to calculate the factorial of that number. Displ
    11·1 answer
  • PLS HELP ILL GIVE BRAINLY- (enter the answer) Microsoft _________ is an example of a desktop publishing software
    13·2 answers
  • Suppose we want to select between two prediction models M1 and M2. We have performed 10-fold cross validation on each. The error
    14·1 answer
  • Does anyone know what episode Hinata threatens useless sakura?
    9·1 answer
  • If a system contains 1,000 disk drives, each of which has a 750,000- hour MTBF, which of the following best describes how often
    15·1 answer
  • To delete unnecessary files on a hard disk use software
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!