1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
2 years ago
9

Please help me with this questionit on the picture​

Computers and Technology
1 answer:
erik [133]2 years ago
3 0

Explanation:

2)computer is a general process machine ,commonly constitution for Digital circuits that accept input stores manipulated and generates output.

example of input:

monitor ,speaker,printer etc.

example of output:

keyboard,cpu,mouse etc.

You might be interested in
A collection of computers and other hardware devices that are connected together to share hardware, software, and data, as well
Gnesinka [82]

Answer:

Computer network

Explanation:

A computer network is a collection of computers and other hardware devices (such as servers, mainframes, network devices, peripherals, or other devices) linked together for the main aim of communicating with each other and sharing of resources and these resources been shared ranges from hardware, software, and even data.

8 0
2 years ago
There are about what licensed drivers here in Florida
arsen [322]
 There are about 15,000,006
6 0
2 years ago
Which statement is most likely to be true about a computer network?
emmasim [6.3K]

<em>Which statement is most likely to be true about a computer network?</em>

<em>A network can have several client computers and only one server.</em>

4 0
2 years ago
Read 2 more answers
Which Supreme Court case resulted in a decree issued for the Michigan Department of Corrections to provide female inmates access
SOVA2 [1]

Answer:

GLOVER v. JOHNSON December 14th 1999 at Michigan

Explanation:

The court case mentioned above is exactly the court case that has ended with a decree being issued  through the Michigan Department of Corrections for providing female inmates the access to the programming which has previously been allowed only to the male inmates. And this happened in 1999, and some big names were part of the jurisdiction. Its a very popular case definitely.

7 0
2 years ago
The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:_________
SashulF [63]

Answer:

A. Arbitrary code execution

Explanation:

A buffer-overrun, also known as buffer overflow occurs when a programmer makes an error during coding, which could make his system easily susceptible to attacks from a hacker. The root cause of this problem is an overflow of data in a buffer, and programs that are written in C and C+ + are more likely to be affected by this problem.  When a buffer-overrun occurs, it would most likely lead to arbitrary code execution.

Arbitrary code execution is an uncontrolled and unrestricted coding by the attacker which alters the original coding. The attacker could input more information into the coding, which alters the original information and which would make the application porous and accessible by just anyone. It is important that programmers run regular tests on their programs, so as to detect any coding errors.

8 0
3 years ago
Other questions:
  • Can you give me a free neon legendary pet in Adopt Me on Roblox!!!​ my user is: IamNathan215
    15·2 answers
  • _ includes websites that encourage interaction and connection among people, businesses, and organizations.
    5·1 answer
  • Which of the following are common problems experienced with software applications?
    15·1 answer
  • What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
    8·1 answer
  • Which routine is configured to be called by another routine?
    10·1 answer
  • "To take advantage of these developments in the digital world, new approaches, concepts,instruments, and methods are needed, whi
    8·1 answer
  • Exercise 4: Bring in program grades.cpp and grades.txt from the Lab 10 folder. Fill in the code in bold so that the data is prop
    12·1 answer
  • Will mark brainliest! What does this code do? What kind of code is this called?
    15·1 answer
  • PLS HELP WITH MY PYTHON HW ILL GIVE YOU BRAINLIEST
    12·1 answer
  • What skills did Carl work on, and what steps did he take to reach his long term goals?<br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!