1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
3 years ago
9

List any three positive impact of a computer​

Computers and Technology
1 answer:
arsen [322]3 years ago
3 0

Answer:

1.People are using computer to perform different tasks quickly. l takes less time to solve problems

2.People are using the computer for paying bills, online businesses and other purposes

3.It also uses in media .Media runs through the internet to passes information from one person to another person

You might be interested in
The object-oriented techniques to manage errors such as dividing a value by 0 comprise the group of methods known as
charle [14.2K]
The object - oriented techniques to manage errors such as dividing a value by 0 comprise the group of methods known as Error handling. Error handling is managing the mistakes made on any type of scenario. This skill is needed to all IT and Computer Science majors.
6 0
4 years ago
Which ofthe following calls on human feelings, basing the argument onaudience needs or sympathies?
Artyom0805 [142]

Answer: a) Emotional appeal

Explanation: Calls on feeling of human is referred as the emotion of the humans ,thus it is said to be an emotional appeal. Other appeals in the options are for the call on technical,logical or unexpected error reason and does not relate to the human audience needs or sympathies .But emotional appeal deals with these need on being called.  So, option (a) is the correct option .

5 0
3 years ago
Secure Hashing Algorithm (SHA) is an algorithm for generating cryptographically secure one-way hash, published by the National I
vitfil [10]

Answer:

64 bits.

Explanation:

Secure Hash Algorithms (SHA) :- These are a family of cryptographic hash functions. There are basically four types of secure hash algorithms for generating cryptographically secure one-way hash.They are as following:-

SHA-0

SHA-1

SHA-2

SHA-3

SHA -2 consists of SHA-512 and the word size used by it is 64 bits.

3 0
3 years ago
What is the system of computers, routers, wires, cables,etc. that allow computers to communicate called?
Anika [276]
Internet maybe?
Not 100% sure though
5 0
3 years ago
Explain what an IM is, and what is the technology shown in the accompanying figure
sergiy2304 [10]

Answer: Instant Message

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program TwoSmallest.java that takes a set of double command-line arguments and prints the smallest and second-smallest n
    5·1 answer
  • Which function is used to display a string value to the screen?
    8·1 answer
  • 1. A formula =A1+B2 is in cell D8. If you copy that formula to cell D9, what is the new formula in cell D9?
    7·1 answer
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual. wh
    5·2 answers
  • Which pair of properties apply to both sound and electromagnetic waves?
    10·2 answers
  • Contextual targeting method mean
    11·1 answer
  • ____ assigns a risk rating or score to each information asset. Although this number does not mean anything in absolute terms, it
    8·1 answer
  • CORRECT ANSWER GETS BRAINLIEST
    8·2 answers
  • 14 Copy a picture of a crane on the next page. Do not trace them. Make a freehand sketch. (2) 2 Look at the placed where the Mar
    11·1 answer
  • What is an algorithm?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!