1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
6

What is a computer?​

Computers and Technology
1 answer:
skelet666 [1.2K]3 years ago
5 0

an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

hope this helps

You might be interested in
What is elif? How does it work in python?
pav-90 [236]
It is the condition used after the if condition. say you use the if condition and you need to add another outcome, instead of using the if condition again, you’d use elif and end it with the else command.

example:

if num == 10:
print (“correct”)

elif num > 10:
print (“too high”)

else:
print (”too low”)

hope this helps :]
5 0
3 years ago
Read 2 more answers
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
The interprets the data while it is in RAM​
Katena32 [7]

Answer:

The input interprets the data while it is in RAM.

Explanation:

5 0
3 years ago
People who connect one network to another within the company or even across organizations are A. central connectors. B. boundary
Lunna [17]

People who connect one network to another within the company or even across organizations are boundary spanners.  

People who serve as ambassadors to linking information and communications on informal networks within different department in an organisation and with other organisations or personnel  far and near for the good of their organisation are called Boundary Spanners.

The importance of Boundary  spanning in organisation includes

  • Exchange of expertise information
  • Nurturing of connections with people from different part s of the world.
  • Improved innovation in businesses

See more here: brainly.com/question/14728967

5 0
3 years ago
A company's intranet is set up on this type of server.
Scrat [10]

Answer:

The answer to the given question is "communication".

Explanation:

In the given question the answer is communication because An intranet is a private network within a company that is used to securely exchange confidential information and resources among employees. and all option are not correct that can be described as:

  • In the intranet, we use the web browser to open web application.
  • The print server is a software program that is used to manages print requests.
  • The web server is used to provide the communication.

That's why the answer to this question is "communication".

7 0
3 years ago
Other questions:
  • Which class of fire extinguisher is appropriate for a fire involving electrical/energized electrical equipment?
    13·2 answers
  • There are only three active stations in a slotted aloha network: a, b, andc. each station generates a frame in a time slot with
    15·1 answer
  • If Chris has a car liability insurance, what damage would he be covered for
    10·1 answer
  • Which of the following is true of lossy and lossless compression algorithms?
    6·1 answer
  • ARP only permits address resolution to occur on a single network.could ARP send a request to a remote server in an IP datagram?w
    9·1 answer
  • Python: initalize the variable first_name with the value from the user prompt "What is your first name? " initalize the variable
    9·1 answer
  • What should be included in research for a problem statement? Select all that apply
    13·2 answers
  • Energía de movimiento de los átomos o moléculas
    11·1 answer
  • Which of the following scenarios describes an advantage of a global economy?
    9·1 answer
  • What is the difference between cyberbullying and bullying.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!