1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jobisdone [24]
3 years ago
13

What is the basic function of a computer?

Computers and Technology
2 answers:
igor_vitrenko [27]3 years ago
8 0
To process information.
ad-work [718]3 years ago
6 0

Answer:

to process information

You might be interested in
Using encryption, a sender can encrypt a message by translating it to which of the following?
Mila [183]

Answer:

Option C is the correct answer for the above question.

Explanation:

The ciphertext is a text which is formed from an original text and can be called a duplicate text which has no meaning for the other user. This can be formed with the help of encryption technology. Encryption technology is a technology that uses some mythology to convert the original data into other text data (which is also called a ciphertext) because no one can able to hack the data.

The above question asked about the term which is called for the text when it is converted from original data. That text is known as ciphertext which is described above and it is stated from option c. Hence option c is the correct answer while the other is not because--

  • Option 'a' refers to the public key which is used to encrypt the data.
  • Option b refers to the private key which is also used for encryption.
  • Option d refers to the sniffer which is not the correct answer.

5 0
3 years ago
If a database is not maintained or if incorrect data is entered into the database, serious problems can occur. What problems cou
Archy [21]

Database is maintained by keeping only relevant data and updating existing data in a timely manner.

This is achieved by issuing proper insert, update and delete operations.

Incorrect data leads to incomplete information. Databases which hold transaction details, any inaccuracies lead to misinformation to its users.

Both the above lead to serious issues in data maintenance and prove the database ineffective. This indicates manhandling of the database.

No maintenance

Database is maintained when only relevant information is present. Irrelevant information includes information like information of past students, old information of current students, etc.

For students who have completed their courses and left, the database should be updated by removing data of such students.

Also, for newly enrolled students, their enrolment should reflect in the official records.

In case of changes in any of the student information, timely update operations should be performed to keep only current data in the database.

All these operations should be done timely in order to avoid any discrepancies in the real data and updated data in the system.

Incorrect data

In situations where incorrect data is input in the student database, incorrect data will be recorded for that particular student. Incorrect data can be related to ssn, name, address, course details and fees payment.

In case of incorrect transaction details like fees payment, this incorrect data will reflect in the student record as well as will affect the overall earnings of the school.

For enrolled students, correct enrollment details regarding the course and classroom should be recorded. Any error in this data will cause the student inconvenience and the respective student will be at loss.

Also, taking advantage of this situation, any outsider acting as an enrolled student, can gain access to the school.

This leads to mismatch of information and can lead to fraud situations against the educational institute.

3 0
3 years ago
20 points!!
creativ13 [48]
I think it’s C considering what clip art is, you put in pictures. i’m crying with you
3 0
3 years ago
Select the correct answer from each drop-down menu.
Furkat [3]

First blank :- <em>highlighting</em>

Second blank:- <em>Changing the font size in the cells that contain the </em><em>data</em>

<em> </em><em>hope </em><em>it</em><em> helps</em><em> you</em><em>.</em><em>.</em><em>.</em><em> </em><em>pls </em><em>mark</em><em> brainliest</em>

6 0
3 years ago
Read 2 more answers
All websites with medical information should be considered credible.
larisa [96]
No, this is not true. WebMD is a great example asking you of simple symptoms that you may be facing and your results could present an apparent fatal disease. This constantly scares the population of netizens whenever they would want a quick diagnosis online through these medical information sites. The best solution to your symptoms is to visit your family doctor or a licensed physician who will give you proper diagnosis checking your vital signs and other related information. Do not always trust the internet and the information it gives you as a user you must take the information with discretion before reacting inappropriately. 
3 0
3 years ago
Read 2 more answers
Other questions:
  • What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
    11·1 answer
  • _____ are shown on an assembly drawing to reference parts to the parts list.
    15·1 answer
  • Which would be a responsible use of technology used by victims of cyberbullying? finding ways to strike back at bullies online.
    15·1 answer
  • To what type of user does he most likely have access? Jae is using a computer at the public library to do research she's able to
    9·1 answer
  • Join zoom meet for time pass purpose <br><br>id=547 458 9345<br>pw=sencHURI​
    8·2 answers
  • Write a program to compute the sum of digits in a number given by the user. You must use your own function to compute the sum of
    6·1 answer
  • Create two functions to calculate the area and circumference of the circle using pointer.
    12·1 answer
  • 1. What is the difference between the wireless network that you provide to your customers versus the wireless network that you w
    5·1 answer
  • A program virus infect​
    10·1 answer
  • Will give brainliest
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!