1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
3 years ago
15

A __engineer specializes in computer hardware design and integration.

Computers and Technology
1 answer:
nata0808 [166]3 years ago
8 0

Answer: D) Computer

Explanation:

A Software Engineer is focused around the creation of Operating Systems and compilers, and a Computer Engineer is the specialization which is based around building and designing hardware.

You might be interested in
Dr. Thomas likes to follow up with her patients to make sure they were happy with their care. She sends all patients an email en
timofeeve [1]

Answer:

lean media

Explanation:

Dr. Thomas uses email as a medium of lean media to convey messages.

Lean media may be defined as the source of conveying messages that are short or of lean capacity. It is meant for instant messages and message and information that is not considered to be of out most importance. Whereas a rich media is a video chat or face to face communication.

Dr. Thomas send emails to her patients to follow up with them and also encourages her patients to call her for appointments or any questions. She uses email as a source of lean media for this communication.

8 0
3 years ago
Read 2 more answers
opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
Alekssandra [29.7K]

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

  1. General Policies
  2. Server Policies
  3. VPN Policies
  4. Back-Up Policies
  5. Firewall Access and Configuration Policies

Cheers!

5 0
4 years ago
Which type of text may be formatted to print at the bottom of every page?
Tatiana [17]
The answer is header.
3 0
3 years ago
When you select Insert and click on a shape the mouse pointer turns into a/an
o-na [289]
The answer to this is C I-beam 
6 0
4 years ago
Read 2 more answers
What are some of the general components of an IDE?
AysviL [449]

Answer:

An IDE normally consists of a source e editor, build automation tools. Most modern IDEs have intelligent code completion. Some IDEs contain a compiler, interpreter, or both.

5 0
3 years ago
Other questions:
  • What will happen with communication methods in five years?
    8·1 answer
  • Using a pin or password in addition to tpm is an example of what type of authentication?
    13·1 answer
  • List and briefly defined categories of security services.
    8·1 answer
  • Which of the following is not a main function within end user support?
    13·1 answer
  • A thin red border indicates the active cell. (True or False)
    12·1 answer
  • Consider a multidimensional array A stored in row-major order with 22 rows and 6 columns whose subscripts start at 0. If each el
    8·1 answer
  • . List 5 types of exploits from cybercrime and provide brief definition. (2.5 Marks)
    5·1 answer
  • Moving your Sprite from right to left is considered the X coordinate?
    5·1 answer
  • Question 8 (True/False Worth 3 points)
    15·1 answer
  • Assignment 6: Animation
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!