1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KiRa [710]
3 years ago
12

Computer is an example of​

Computers and Technology
2 answers:
MAXImum [283]3 years ago
7 0

Answer:

Computer is an example of electronic device.

Zinaida [17]3 years ago
7 0
It is an example of Electronic device
You might be interested in
In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
Natasha_Volkova [10]

Answer:

Caesar cipher

Explanation:

In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.

There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.

Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.

Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.

4 0
3 years ago
What kind of device should you install if you need the device to perform network address translation, facilitate access to the I
just olya [345]
The Correct Answer would Be A Router.
8 0
3 years ago
What is the output of the following program?
Amiraneli [1.4K]

Answer:

1 2

1 1

1 0

Explanation:

i got it wrong for the awnser

3 0
3 years ago
Read 2 more answers
HW7.24. Return nth integer from CSV string The function below takes two parameters: a string parameter: CSV_string and an intege
kotykmax [81]

Answer:

The solution code is written in Python 3.

  1. def processCSV(CSV_string, index):
  2.    data = CSV_string.split(",")
  3.    result = data[index]
  4.    return int(result)
  5. processCSV('111,22,3333,4', 2)

Explanation:

Firstly, create function and name it as <em>processCSV()</em> with two parameters, <em>CSV_string</em> and <em>index</em> (Line 1).

Since the CSV_string is a collection of integers separated by comma, we can make use of Python String built-in method <em>split() </em>to convert the <em>CSV_string </em>into a list of numbers by using "," as separator (Line 2).

Next, we can use the <em>index</em> to extract the target value from the list (Line 3).

Since the value in the list is still a string and therefore we shall use Python built-in method int() to convert the target value from string type to integer and return it as output of the function (Line 4)

We can test our function by using the sample test case (Line 6) and we shall see the expected output: 3333.

8 0
3 years ago
You are the head of the corporate security department, and the Microsoft teamhas asked you for some assistance in setting the pa
IgorC [24]

Answer:

d. Local Security Policy

Explanation:

Local security policy refers to different security settings that are present on a local computer. Local security policy can include administrative rights assignments and password.

This can also mean policies that enables an administrators to set users privileges by so doing guiding what users are permitted to do on the computer.

6 0
3 years ago
Other questions:
  • PriQueue inherits from Queue. In the implementation of the getMax() method in the PriQueue class, we need to read and write the
    5·1 answer
  • Which of the following courses would an aspiring film composer most likely take?
    12·2 answers
  • When you use a mouse to select a row or column in a table, word displays a(n) ____?
    5·1 answer
  • Who invented the first RAM stick
    11·1 answer
  • Electricity was seen as a mysterious force and began to creat a stir when people called​
    13·1 answer
  • Which scenario shows the best example of intrinsic motivation?
    13·2 answers
  • 50 POINTS
    6·1 answer
  • Which cpu type would most likely be found in a smartphone?.
    10·1 answer
  • What is the introduction of an algorithm and programming and how does it work?
    11·1 answer
  • ____ increase network performance by reducing the number of frames transmitted to the rest of the network
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!