1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
3 years ago
5

Question 1 (1 point)

Computers and Technology
2 answers:
worty [1.4K]3 years ago
8 0

Answer:

1)hardware

2)hard drive

3)network devices

4)software(its all u can touch from a computer)

5)false

6)system software

7)programming software

8)data

9)user

10)users

Explanation:

juin [17]3 years ago
8 0
1: Hardware
2: Motherboard
3: Network Devices
4: Software
5: False
6: System software
7: Programming software
8: Application software
9: Data
10: Users
You might be interested in
______ have become a common and easily created form of malware that are creating using applications such as Visual Basic or VBSc
Helen [10]

Answer:

Macro Viruses

Explanation:

Macro Viruses have become a common and easily created form of malware that are creating using applications such as Visual Basic or VBScript.

7 0
3 years ago
What is a relationship between a object and a class?
bonufazy [111]

Hiya!


Of the options given, I would say A. An object is an instance of a class is the correct choice.

Hope this helps!

6 0
3 years ago
Read 2 more answers
Whenever you communicate online, remember a. to delete anything you don't want to keep b. everything you put online is available
maxonik [38]

Answer:

B-Everything you put online is available forever. Messages or photos will never be permanently deleted from memory cards on cameras or cell phones.

5 0
3 years ago
Columns are labeled with letters and Rows are labeled with numbers.
n200080 [17]
The answer is A.True
3 0
4 years ago
What can amber do to make sure no one else can access her document?
Lelu [443]

Answer:

Amber needs to run with the document and hide it in a safe place so no one else can access her document:)

7 0
4 years ago
Read 2 more answers
Other questions:
  • A primary mailing list for new vulnerabilities, called simply __________, provides time-sensitive coverage of emerging vulnerabi
    10·1 answer
  • Which osi model layer manages data encryption?
    14·1 answer
  • Give two reasons why network security is the most important issue regarding data centers.
    15·1 answer
  • Which keyboard feature is a form feed character?
    15·1 answer
  • This diagram shows who is responsible in preventing cyberbullying. A flowchart. Top box is labeled Cyberbullying can be prevente
    14·2 answers
  • If the individual accessing the system for disaster recovery purposes were not familiar with the IT system and required system a
    5·1 answer
  • Part 1: Plan and Write the Pseudocode
    7·1 answer
  • What are your thoughts about this re-designed Logo? Is it good? Or is poorly designed? Explain your answer below.
    13·1 answer
  • As you continue to build the help desk, you want to ensure that all of the tools are in place and that the analysts have the too
    15·1 answer
  • This study highlights that people access social networking sites to be
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!