1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kodGreya [7K]
2 years ago
8

Computer is a major source of informarion why​

Computers and Technology
1 answer:
eimsori [14]2 years ago
8 0

Answer:

The answer to this question is given below is the explanation section.

Explanation:

Computer can  process and store data.It can easily store large amount of data and process the data very fast but it is not the source of information it serve as a store of information because it store information and whenever we need any information we can retrieve that information from computer memory.in this way computer is s source of information.

You might be interested in
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
rjkz [21]

Answer:

Distributed DOS attacks.

Explanation:

Computers in a network or the network itself is are prone to cyber attacks. A cyber attack is a concept of taking advantage of computer network vulnerabilities, to retrieve information from the target source. An example of these types of security attacks is the denial of service (or DOS) attacks.

The DOS  or the distributed DOS attack prevents users form accessing or requesting a service that they are legitimately allowed, by flooding the target system with superfluous resource request from millions of computers, controlled by the attacker.

8 0
3 years ago
Sharing a workbook enables multiple users to access the workbook. What are the benefits of using a shared workbook?
damaskus [11]

Answer:

Some of the benefits of sharing a workbook include:

A. Shared information between students (ie: Mary writes a note about (blank) in the workbook and John reads said note and receives addition information about (blank)).

B. ^adding onto this, discussion on interpretations of a passage (ie: John thinks (blank) means this and Mary thinks (blank) means other thing, through notes they can discuss the meaning of the text.

Hope this helps. =)

8 0
3 years ago
5 steps in cleaning and sanitizing smokehouse​
topjm [15]

Answer:

  1. Scrape or remove food bits from the surface.
  2. Wash the surface.
  3. Rinse the surface.
  4. Sanitize the surface.
  5. Allow the surface to air-dry.

Explanation: These are steps for cleaning and sanitizing.

4 0
3 years ago
What methods could you use to set up printing in an organization?
shutvik [7]

The used to set up printing in an organisation are as follows;

  • Connecting directly to the printer
  • setting up a print server
  • using a cloud service to set up printers.

<h3>Method for printing in organisation.</h3>

There are different method for setting up printing in an organisation.

They include the following;

  • Connecting directly to the printer : directly connecting a printer; From small to large organizations, you have lots of ways to set up a printer.
  • setting up a print server
  • using a cloud service to set up printers. There are numerous cloud service that could render this service like goggle.

learn more on printing here: brainly.com/question/14668983

#SPJ11

3 0
1 year ago
What are some of the challenges that could arise from setting up a file management system on a computer
Katarina [22]
<span>You could download some software that could mess up your whole computer.</span>
3 0
3 years ago
Other questions:
  • What was the partition style(s prior windows server 2008 and windows vista?
    13·1 answer
  • Reggie has hired you to design a home network. The home network will share a printer but will mainly be used to stream movies to
    7·1 answer
  • Bullets in a text box will do which of the following?
    9·2 answers
  • The communication channel used in IMC must rev: 12_06_2018_QC_ CDR-223 Multiple Choice match the traditional channel used in tha
    14·1 answer
  • What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
    7·1 answer
  • Can web sites contain copyright material? <br> Yes <br> No
    10·2 answers
  • What is sun and what does it do?
    12·2 answers
  • What are the side effects of overclocking?
    13·1 answer
  • Which of the examples is part client side code
    10·1 answer
  • In the broadest of terms, the performance management process features a cycle that begins with ________________ and concludes wi
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!