1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margaret [11]
3 years ago
8

Please answer soon

Computers and Technology
1 answer:
GREYUIT [131]3 years ago
5 0
Answer: Internet, I’m pretty sure about my answer.

Explanation: Anonymous communications have an important place in our political and social discourse.
You might be interested in
What is the manufacturer’s specific ID for Intel Core?
Vlad1618 [11]
1c:eb:e6 Is the manufacturer’s specific ID
3 0
3 years ago
Select the correct answer.
AveGali [126]

Answer:A

Explanation:

3 0
3 years ago
Read 2 more answers
The cpu understands instructions written in a binary machine language. <br> a. true <br> b. false
Jet001 [13]

The CPU understands instructions written in a binary machine language: A. true.

<h3>What is a CPU?</h3>

CPU is an abbreviation for central processing unit and it can be defined as the main components of a computer because it acts as the “brain” of a computer and does all the processing, calculations, and logical control of the data entered through the keyboard into output that are displayed on the monitor.

This ultimately implies that, the central processing unit (CPU) performs most of the calculations, which enables a computer to function and is sometimes referred to as the “brain” of the computer.

Generally, the central processing unit (CPU) only understands instructions that are written in a binary machine language.

Read more on CPU here: brainly.com/question/5430107

#SPJ1

7 0
2 years ago
What does the computer receive when you press a key on a laptop keyboard?
Anit [1.1K]

Answer:

a computer receives signal

6 0
3 years ago
Please Help
andrew-mc [135]

Answer:

A, C, and E

Explanation:

B and D have nothing to really do with the software. You can copy files by using software, you can delete files, and it lets you manage your shared folders. You cant really view events by using software and you cant find out more stuff about security events from it. Hope this helps. :) <3

5 0
3 years ago
Read 2 more answers
Other questions:
  • Retail price data for n = 60 hard disk drives were recently reported in a computer magazine. Three variables were recorded for e
    13·1 answer
  • White arrows in the middle of the lane indicate whether the lane must __________.
    8·2 answers
  • What is the purpose of the operating systems processor management function
    7·1 answer
  • When does kernel panic occur?
    14·1 answer
  • A Network Management Station (NMS) is using SNMP to manage some Cisco routers and switches with SNMPv2c. Which of the following
    10·2 answers
  • If two different devices try to transmit to a common device at the same time, switches suffer from a problem in the collision do
    13·1 answer
  • Chunking is a good strategy for completing large assignments because it makes the work
    7·2 answers
  • What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view
    5·1 answer
  • A list contains the following items: Antelope, Baboon, Cheetah, Elephant, Giraffe, Hippo, Jackal, Lion, Okapi, Warthog. ​(a)​A b
    5·2 answers
  • In what year was the earliest documented use of the word computer?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!