1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elanso [62]
3 years ago
8

What is computer how is it used in banking and shopping​

Computers and Technology
1 answer:
REY [17]3 years ago
6 0

Answer:

A computer is an electronic machine which inputs raw data,processes it and finally gives out the meaningful result as output

You might be interested in
What is LINUX?
valkas [14]

Answer:

The answer is A

Explanation:

I know what it is.

4 0
3 years ago
Read 2 more answers
Digital Media Equipment: Best Practices Quiz
natulia [17]
  1. <u>False:</u> Location of a video or photoshoot is not important when it comes to preplanning the shoot.
  2. <u>True:</u> Booms are large adjustable poles to mount microphones.
  3. <u>False:</u> It doesn't matter what you clean your camera lens with- you should just grab whatever cloth you have.
  4. <u>True:</u> Safety should be the most important thing when conducting a photo or video shoot.
  5. <u>True:</u> It's important to properly clean and store your equipment after a photo or video shoot.

<h3>What is a photoshoot?</h3>

A photoshoot can be defined as a photography session that involves the use of <u>digital media</u> equipment to take series of pictures (photographs) of models, things or places, etc., especially by a professional photographers.

<h3>The digital media equipment in a photo or video shoot.</h3>

Some examples of the <u>digital media</u> equipment that are used in a photo or video shoot include the following:

  • Boom
  • Camera
  • Microphone
  • Lenses
  • Battery
  • Tripod

Read more on photoshoot here: brainly.com/question/26643795

4 0
2 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
lesya692 [45]

Answer:

True

Explanation:

In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key requirements includes certification and accreditation, which is a process that occurs after the system is documented, controls tested, and risk assessment completed. It is required before going live with a major system. Once a system is certified and accredited, responsibility shifts to the owner to operate the system is a true statement.

8 0
3 years ago
What will happen when a user attempts to login to salesforce from an ip address that is outside the login ip range on the user's
podryga [215]

Answer:

The answer to this question is option "d".

Explanation:

The answer is user will not be able to login at all. The user wants to log in to the salesforce by its IP address. But in the server, all the IP addresses will be registered for their special work. When the user inserting their IP address to log in to the salesforce. The first server will be checking into there database. If IP address doesn't match it will not permit to access salesforce because in their server it is not a valid IP address. It is registered in sever but not for this user.

So the answer to this question is option "d".

7 0
3 years ago
What does % find on edhesive??
statuscvo [17]

Answer:

Explanation: What is that word you typed?

3 0
3 years ago
Other questions:
  • In a word processing program, the ribbon or menus contain the
    12·1 answer
  • What are some effective methods for scrolling? Check all that apply.
    6·1 answer
  • An overall indication of the dependability of data may be obtained by examining the ________, credibility, reputation, and _____
    15·2 answers
  • (PYTHON) Write a program that uses this technique to read a CSV file such as the one given above. Display the IDs and names of t
    14·1 answer
  • What is the function of a breadcrumb trail website
    7·1 answer
  • Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds o
    8·1 answer
  • . What type of computer implementation does the following code represent? Load A,10 Load B,1:5 Add A,B STORE A, [20]
    5·1 answer
  • The current annual interest rate is 5 percent, and you are taking out a 20-year loan with a monthly end-of-month payment. If you
    5·1 answer
  • Game Design!
    10·2 answers
  • before you start researching fleet management software, your first task is to clearly define the problem. this will help guide y
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!