1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
3 years ago
7

Desktop and personal computer are also known as​

Computers and Technology
1 answer:
m_a_m_a [10]3 years ago
4 0
They are also known as general computers
You might be interested in
Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
bagirrra123 [75]

Answer:

Check the explanation

Explanation:

1) The single router approach is a security Implementation of all security policies and the defense-in depth approach employs a firewall. the DMZ approach Is establish between two routers with a firewall.

2) The single router approach is for small offices and homes.

The defense in depth approach is for large organizations.

The DMZ approach is for publicity operated networks.

3) The DMZ can provide better defense because it has more than two firewall for increased security.

5 0
4 years ago
In the replace dialog box, clicking what button changes highlighted text
Andre45 [30]

ANSWER: Replace Button

EXPLANATION: After opening the replace dialog box and putting the desired values in the boxes, we need to click the 'Replace' button to change the highlighted text. If the word which needs to be changed appear multiple times in the document, then clicking on 'Replace All' is advised as it would change all the old words with the new ones.

7 0
3 years ago
Read 2 more answers
Kerrri uses a database file many time a day. To increase her productivity, she should___.
Dmitriy789 [7]

Answer:

D

Explanation:

A shortcut will make it easier for her to access the database file

4 0
3 years ago
3. Program to find the sum of all even numbers from m to n, where m and n
Gnom [1K]

Answer: M and E

Explanation: Hope this helps

8 0
3 years ago
Say you are running a program along with many other programs in a modern computer. For some reason, your program runs into a dea
swat32

Answer:

The OS deals with such deadlock to temporarily prevent resources from deadlocked processes. It is either it back off a process to some check point allowing preemption of a needed resource and restarting the process at the checkpoint later. Finally, successively kill processes until the system is deadlock free.

6 0
4 years ago
Other questions:
  • If a small monster collector has 20 small monster containment devices; intends to use all of those devices; has access to non-un
    13·1 answer
  • Bill's manager has asked him to send all staff members the directions for checking out the new projector. In 1–2 sentences, desc
    15·2 answers
  • .In Linux what command sequence do we enter to stop a program?
    11·1 answer
  • Which event occurs when the user clicks on an html element?
    9·1 answer
  • Why is it unlawful for an employer to refuse to employ someone based solely on their gender without evidence that such a charact
    9·1 answer
  • What is a command-line interactive scripting environment that provides the commands for almost any management task in a Windows
    9·1 answer
  • I am in school what should i do i am 15
    5·2 answers
  • An integer is said to be a perfect number if the sum of its divisors, including 1 (but not the number itself), is equal to the n
    9·1 answer
  • 1.Which one of the following buttons returns a window to its original size?
    11·1 answer
  • Given that the input A is false, the input B is false, and the input C is true, what is the resulting value of the output?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!