1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rus_ich [418]
3 years ago
13

SOMEONE PLEASE HELP ME OUT WITH THIS PLEASE

Computers and Technology
1 answer:
Vaselesa [24]3 years ago
3 0

Answer:

Ideate

Explanation:

You might be interested in
Any part of the computer that you can touch is called ________.
Mars2501 [29]
Hardware is the answer.

Software is not really tangible
Operating system is software
Input is not truly 'physical'
7 0
3 years ago
2min speech on can teachers be replace by technology​
elena-s [515]

Answer:

The boom of online courses, where anyone can learn from the comfort of one’s own home or office at their own chosen time is the main cause. When online courses made their foray a decade ago, the same question of technology replacing teachers in schools emerged as a major argument. However, if we ask you today whether calculators can replace mathematics teachers at school, what would you say? Sounds weird, right! Do you think calculators which are also a kind of a technological advancement only, are capable enough of themselves, so as to replace the teachers? The answer is obvious. It’s an obvious No!

6 0
3 years ago
The words, the computer is the future, has how many bits?
Nadusha1986 [10]

The words, the computer is the future, has 64 bits.Modern computer has

two types of processors which include:

  • 32 bit
  • 64 bit
<h3>Bits</h3>

This is referred to as the smallest unit of data which is used in a computer.

The 32 bit computer are the old types which have a smaller processor and is

relatively slow.

The 64 bit computer on the other hand are the modern types with large

processors and are relatively fast.

Read more about Computer here brainly.com/question/13380788

4 0
2 years ago
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web
timofeeve [1]
A spoofing attack. "<span>a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage."</span>
8 0
3 years ago
Images of movies are common types of software true or false
topjm [15]

Answer:

True

Explanation:

3 0
2 years ago
Other questions:
  • In Java :
    11·1 answer
  • How do i start makeing a Character in the Unreal Game Engine
    14·2 answers
  • What registry file contains installed programs' settings and associated usernames and passwords?​?
    13·1 answer
  • IT investments can lead to developing IT capabilities and dynamic IT competencies, which can lead to achieving the following six
    5·1 answer
  • Write an if statement that assigns 100 to x when y is equal to 0.
    7·1 answer
  • How can you tell that a spreadsheet was saved as a 2007 Excel file?
    7·1 answer
  • List the gcc command-line options for each of the following: Generate a .o file rather than an executable. Generate a .s (assemb
    6·1 answer
  • Sean Cody is a website most known for what?
    9·2 answers
  • Write a pseudocode to calculate the volume of a cylinder​
    12·1 answer
  • If a computer uses 500 characters, how many bits this system requires to give different code to all characters?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!