1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pogonyaev
3 years ago
11

What is your favorite anime?

Computers and Technology
1 answer:
ira [324]3 years ago
6 0

Answer:

Fullmetal Alchemist: Brotherhood (160,975)

Explanation:

Fullmetal Alchemist: Brotherhood (160,975)

You might be interested in
What is the role of the federal government in regulating the media and the internet?
Leviafan [203]

Answer:

Explanation:

The media and internet regulation depends on the country and the government.

For example:

China has the biggest Internet regulation in the world, there is not an occidental website like social media, It is practically the biggest intranet in the world, television and general media has a regulation in this Asian country.

Venezuela is another country with regulation, in this case, the internet is not closer than China, but television and newspaper are controlled by the government.

In countries like Mexico and Honduras, the governments spend a lot of money on advertising, this is not a regulation, but it is indirect control, in this way you see what they want you to see.

7 0
3 years ago
Read 2 more answers
Componets of computer
Temka [501]

The four components of computer are explained clearly.

<u>Explanation:</u>

  • Hardware is the electrical physical parts that a computer system needs to function. It organizes all the process  by a circuit board that operates within a PC or laptop; built with the "motherboard", "graphics card", "CPU (Central Processing Unit)", "ventilation fans", "webcam", "power supply", and so on. Without hardware, there is no means of running the necessary software that makes computers so valuable.
  • Software is a program that facilitates a computer to execute a particular task, as objected to the hardware. Computer software has to be "stored" into the computer's storage (such as a hard drive, memory, or RAM). Working computer systems segment software into three major classes: system software, programming software, and application software.
  • A user is a person who handles a computer or network service. Users of computer and software output regularly require the technical expertise needed to fully know how they operate.
  • Data is defined as bases or figures, or knowledge that's saved in or utilized by a computer. This data will be in the form of text documents, images, audio clips, software programs, or other types of data. Computer data may be prepared by the CPU and are saved in files and folders on the hard disk.
3 0
3 years ago
. One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
Komok [63]

Answer: C)report the status of individual computer users

Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.

Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)

3 0
3 years ago
Create the tables and appropriate constraints based on the following ER diagram. Use appropriate data types. Note that the size
SpyIntel [72]

Answer:

See explaination

Explanation:

CREATE TABLE CATEGORY

(

cid int NOT NULL,

description varchar2(1000),

PRIMARY KEY (cid)

);

CREATE TABLE PRODUCT

(

pid int NOT NULL,

description varchar2(1000),

cid int,

price int,

p_size varchar2(1),

CONSTRAINT chk_price CHECK (price>0),

CONSTRAINT chk_size CHECK (p_size in ('S','M','L')),

CONSTRAINT fk_cid FOREIGN KEY (cid) REFERENCES CATEGORY(cid)

);

7 0
3 years ago
Give me username ideas for rblx.
alexandr1967 [171]

Answer: Larz7, Dracofli0, butterbro171,OVOclan1011, ect.

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Productivity software has been used for a number of years. Recent advancements in productivity software technology have made ___
    14·1 answer
  • A slideshow that accompanies an oral report is known as what?
    6·1 answer
  • Is full dive vr possible and can we accomplish it with today’s technology? Explain why
    13·2 answers
  • Help me find the difference between these logos
    10·2 answers
  • Two types of formulas in Excel, what are they? A. Complex and simple, B. General and currency, C. Logical and Boolean, D. Trig a
    15·1 answer
  • Which of the following statements tests if users walked 10,000 or more steps and ate fewer than 25 grams of sugar?
    9·1 answer
  • computer is an electronic machine that is used for data processing to produce meaningful information explain in statement​
    5·1 answer
  • Draw
    7·1 answer
  • Are there any Potential Dangers in Artificial Intelligence?
    11·2 answers
  • Who is the best nfl team in your mind
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!