1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastaziya [24]
3 years ago
6

The most widely used computer device​

Computers and Technology
2 answers:
Maru [420]3 years ago
8 0
Internal hard disk i believe
irinina [24]3 years ago
5 0

Answer:

I think a phone...........

You might be interested in
Whose work is responsible for the invention of the air bag? Scientist, Engineers or both?
jenyasd209 [6]

The scientist and the engineers were both responsible for the invention of the airbag.

  • Peter Florhancicn was a scientist and he invented the airbag because of the Dutch people who drowned when they drove into the canals

  • Also, John Hetrick who was an engineer filed for the patent of airbags when he saw that deers were running across the road. He believed that it could cause an accidentthat led to the invention.

In conclusion, both the engineers and the scientists were responsible.

Read related link on:

brainly.com/question/24686827

3 0
2 years ago
(20 points) Given a collection of n nuts and a collection of n bolts, arranged in an increasing order of size, give an O(n) time
Blababa [14]

Answer:

Check the explanation

Explanation:

Keep two iterators, i (for nuts array) and j (for bolts array).

while(i < n and j < n) {

if nuts[i] == bolts[j] {

We have a case where sizes match, output/return

}

else if nuts[i] < bolts[j] {

what this means is that the size of nut is lesser than that of bolt and we should go to the next bigger nut, i.e., i+=1

}

else {

what this means is that the size of bolt is lesser than that of nut and we should go to the next bigger bolt, i.e., j+=1

}

}

Since we go to each index in both the array only once, the algorithm take O(n) time.

6 0
3 years ago
Refer to the exhibit. A network administrator configures a named ACL on the router. Why is there no output displayed when the sh
nignag [31]

Answer:

The correct answer to the following question is ACL name is the case sensitive.

Explanation:

ACL name is unique, alphanumeric and case sensitive that's why the router deals like the access_network, the ACCESS_NETWORK as it if they are the two separates ACL's.

That's why ACL always has the unique identities.

7 0
3 years ago
A digital certificate confirms that the macro created by the signer has not been altered since the digital certificate was creat
Nesterboy [21]

Answer: False

Explanation:

Digital certificate is defined as entity identification in digital form that is used by a user or firms to share their information along with authentication and security. It uses public key cryptographic technique and so it is also know as public key certificate.

  • Digital signature is the signature that is done digitally to secure data or document.It maintains security of the content present  in message of information that is being exchanged through e-signature.It follows encryption technique for maintaining authenticity.
  • Therefore, digital signature is the signing feature that protects macro after being made to maintain its authenticity.
  • Thus, the given statement is false.
3 0
3 years ago
In a peer-to-peer network, every computer can communicate directly with every other computer. In addition, every computer is cap
KonstantinChe [14]

There are lot of computer network. The security concerns do you have about this type of network is that;

  • They are not really secure this is because in simple installations, data and other resources are shared by network users and this can be easily seen and used by individuals who have not been authorized.

<h3>Peer-to-Peer Network </h3>
  • This is known as a type of network where every computer are able to communicate directly with every other computer.

All computer on this network has equal. but, each computer are configured to share only some of its resources. It is known for its security risk of data been not safe in this network.

Learn more about network from

brainly.com/question/1172049

6 0
2 years ago
Other questions:
  • Which of the following is not a common network architecture type?
    9·1 answer
  • What is your favorite food
    11·2 answers
  • Why can’t I “change the country” on settings??<br> (In this app)
    13·1 answer
  • You are in the windows power shell window and decide to encrypt folder which of the following command do you use
    7·1 answer
  • There is an interface I that has abstract class AC as its subclass. Class C inherits AC. We know that C delegates to an object o
    12·1 answer
  • I need help about computer program. Solve C language code...... please​
    7·1 answer
  • Write a program that reads in exam scores and displays the average score and the high score.
    9·1 answer
  • Diffreciate between primary source of information and secondary source of information​
    5·1 answer
  • Which option will be used to attach email messages ​
    6·1 answer
  • Which statements describe the advantages of using XML
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!