1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iVinArrow [24]
3 years ago
11

Why and how of computers

Computers and Technology
1 answer:
makkiz [27]3 years ago
3 0

Answer:

?

Explanation:

You might be interested in
Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down
Natasha_Volkova [10]

Answer:

cyber-extortion

Explanation:

Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down Berryhill's website unless Ashley wired payment to an overseas account. Ashley was concerned that Berryhill Finance would suffer huge losses if its website went down, so she wired money to the appropriate account. The author of the e-mail successfully committed cyber-extortion.

7 0
3 years ago
In the following project, you will edit a worksheet that will be used to summarize the operations costs for the Public Works Dep
yan [13]

Answer:cgtd

Explanation:

3 0
3 years ago
When can design templates be applied to the presentation?
Sophie [7]

Answer:

when you add a new slide

Explanation:

I think it's correct

8 0
3 years ago
Determine the hexadecimal value of a mask that can be used to complement the values of thefirst and third bits of f1ag and leave
Makovka662 [10]

Answer:

Let our mask be 1010000...000. Notice that, if we apply XOR operation to any number with this mask, the first and third bits will be complemented and all other bits will be unchanged. Since for each individual bit, XOR with 0 does not change the value of bit and XOR with 1 changes the value of bit.

Explanation:

To give a hexadecimal number, we should know the number of bits in representation of number.

8 0
4 years ago
Suppose you are a merchant and you decide to use a biometric fingerprint device to authenticate people who make credit card purc
luda_lava [24]

Answer:

i dont know the answer

Explanation:

3 0
3 years ago
Other questions:
  • What is the circular motion that the earth makes in its orbit around the sun
    14·1 answer
  • With a(n) ____ the editor, compiler, and executer are combined in the same application.
    7·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    13·1 answer
  • Why can black holes not be seen?
    5·1 answer
  • One way to describe the note-taking tool eNotes is to call it an electronic notebook. electronic sticky note. online web clippin
    5·2 answers
  • An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours plus any overtime pay. Ove
    13·1 answer
  • Computers that have multiple CPUs within a single computer, sharing some or all of the system's memory and I/O facilities, are c
    15·1 answer
  • What is the name of the file manager in Microsoft Windows?​
    5·1 answer
  • How do you change a automatic transmission
    9·1 answer
  • A device that turns hard copy, such as a paper document, into a digital format that can be viewed or manipulated on a computer i
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!