1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alecsey [184]
3 years ago
5

(Technical terms) The classification computer into five distinct phases.​

Computers and Technology
1 answer:
vladimir2022 [97]3 years ago
4 0

Answer:

Computing is any goal-oriented activity requiring, benefiting from, or creating computers. It includes development of both hardware and software. Computing has become a critical, integral component of modern industrial technology. Major computing disciplines include computer engineering, computer science, cybersecurity, data science, information systems, information technology and software engineering

<em>《</em><em>please</em><em> </em><em>mark</em><em> </em><em>as</em><em> </em><em>brainlist</em><em>》</em>

You might be interested in
as measuring the current, the shunt resistance of a galvanometer is needed to be zero. so why don't we put a wire parallel to th
Mariulka [41]

Galvanometer is a device used to detect an electric current.

<u>Explanation:</u>

A galvanometer is an electro mechanical instrument utilized for distinguishing and demonstrating an electric flow. A galvanometer fills in as an actuator, by creating a revolving redirection, in light of electric flow moving through a loop in a consistent attractive field.

Galvanometer is a gadget which is utilized to quantify electric flows. Note that the shunt obstruction must be low with the goal that greatest current goes through the shunt. Thus galvanometer can be utilized to gauge high flows.

7 0
3 years ago
A file name extension provides what information about a file?
ASHA 777 [7]
In a file extension, it tells what type of file it is and tells what compiler to run the code.
8 0
2 years ago
Read 2 more answers
A company wishes to increase security at the employee entrance. Which of the following technologies would be the most useful?
AVprozaik [17]
I believe a metal detector would be a fine choice for an employee entrance. 
5 0
3 years ago
Read 2 more answers
Describe it the impact of computer in office?​
krok68 [10]

Answer:

Computers in the office environment significantly enhance productivity. According to the Reference for Business Web site, computers in the office increase productivity not only in areas such as word processing, data management and information access, but also in information creation, collation and ultimately storage. The amount of time most office workers spend at the computer has, however, given rise to a number of repetitive strain health problems on eyes, wrists and hands

hope it helps (^^)

# Cary on learning

7 0
2 years ago
Which of the following is good practice to ensure that you do not get malware on your computer from an online source?
Lina20 [59]

Answer:

go to a authorised site which is secure

Explanation:

5 0
3 years ago
Other questions:
  • <img src="https://tex.z-dn.net/?f=3x%20-%205%20%3D%203x%20-%207" id="TexFormula1" title="3x - 5 = 3x - 7" alt="3x - 5 = 3x - 7"
    12·1 answer
  • When I comes to saving money, what is good rule of thumb
    5·1 answer
  • What will empty the log of Internet sites you have recently viewed
    12·2 answers
  • ______involves encoding information using fewer bits than the original representation Group of answer choices
    6·1 answer
  • The product of two integers is -180 if one of them is 12 find the other​
    14·1 answer
  • Viruses which activate themselves after a specific time is called
    10·2 answers
  • Write a program that asks the user to enter a series of single digit numbers with nothing separating them. Read the input as a C
    12·1 answer
  • A ____________ protocol is software that provides or facilitates a connection in which no information is retained by either send
    13·1 answer
  • Python Coding:
    15·1 answer
  • Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!