1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SCORPION-xisa [38]
3 years ago
9

What is computer system ?​

Computers and Technology
2 answers:
Cloud [144]3 years ago
7 0

Answer:

Invertebrates are animals that neither possess nor develop a vertebral column, derived from the notochord. This includes all animals apart from the subphylum Vertebrata. Familiar examples of invertebrates include arthropods, mollusks, annelid, and cnidarians

Over [174]3 years ago
6 0

Answer:

a system that is a computer

You might be interested in
Which port security violation mode does not generate messages or increment the violations counter?
Zanzabum

The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

<h3>What is  offence?</h3>

A deviation from a code of conduct or law is referred to as a violation. When driving a car, going over the posted speed limit is a regular legal violation. Invading someone else's privacy could include reading their journal. failure to uphold a duty or right; breaching the law.

The two types of violations are states and acts. A transgression is a violation of the rules that is less serious than a foul and frequently involves technicalities of the game. A disrespectful or vulgar act: profanation.

Hence, The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

To learn more about violation, refer to:

brainly.com/question/1274113

#SPJ4

4 0
1 year ago
How come the scroll bar on the PA emojis only appears sometimes? how do I make it appear?
astraxan [27]
Answer it your own self everybody can't always give u the answers
5 0
3 years ago
Write the code for invoking a method named sendVariable. There is one int argument for this method. Assume that an int variable
malfutka [58]

Answer:

The code to this question is "sendVariable(x);".

Explanation:

The explanation of the (method calling) code can be given as:

  • In the question, it is defined that there is a method that name is "sendVariable()". In this method, we pass an integer variable that is "x".
  • The variable x value is already declared and assigned and this variable is passed in the method.
  • This method is defined in the same class so the code for calling this method is "sendVariable(x);".

6 0
2 years ago
To provide both encryption and integrity protection, wpa2 uses aes encryption with:
lara [203]

WPA 2 stands for Wi-Fi Protected Access, version 2. It is the latest protocol that effectively protects 802.11 wireless traffic across a LAN. It belongs to the 802.11 protocol.

To provide both encryption and integrity protection, wpa2 uses aes encryption with Counter and CBC MAC (CCM) Mode.

3 0
2 years ago
What should you do if you do not have the experience required for the job you want?
Alla [95]

Answer:

try to get an internship and learn more and gain experience and you can resign and apply for the job you want

Explanation:

hope this helps

please like and Mark as brainliest

4 0
3 years ago
Other questions:
  • Search the internet for news of a motor vehicle collision in your community involving drugs or alcohol. Keeping in mind that you
    15·1 answer
  • If a storm is 7.5 kilometers away, how much time is expected between observations of lightning and thunder? Round your answer to
    10·1 answer
  • C2.5 - A group of four pirates has a treasure chest and one unique lock and key for each pirate. Using hardware that is probably
    6·1 answer
  • Multiple choice
    9·2 answers
  • Which windows tool can you use to find out if the hard drive is slowing down windows performance?
    9·1 answer
  • Referential integrity states that:______.
    15·1 answer
  • Explain the importance of mobile computing in communication​
    5·1 answer
  • 1. Write a program that declares an array named alpha with 50 components of the type double. Initialize the array so that the fi
    8·1 answer
  • Effective nonverbal communication can cause tension.<br><br> True or False
    15·1 answer
  • The ____ attribute can be used only with input boxes that store text. Group of answer choices type pattern required value
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!