1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slamgirl [31]
3 years ago
11

What product use programmable control?

Computers and Technology
1 answer:
Bogdan [553]3 years ago
5 0

Answer:

water tank quenching systems

You might be interested in
How do you think advances in processors affect corporations that discover the computers they purchased just a couple of years ag
lozanna [386]

Answer:

Increased processor speed and multi core technologies.

Explanation:

The development of processors over the years is overwhelmingly fast. The CPU use to be cumbersome, expensive and computational speed was moderate.

As it evolves, the CPU was minimized to give rise to microprocessors.

Microprocessors are very fast, running millions of processes on its core. The multiple core processors helped to increase the speed of these processors.

When there are more than one core in a processor (dual, quad or octal core), it processes data in parallel reducing the time of execution compared to a one core processor.

A company having computers with single core would need to upgrade to a new computer with multi core processor to promote speed in data processing.

3 0
3 years ago
A Trojan horse:
Elis [28]

Answer:

The answer is "option D"

Explanation:

Trojan horse is a software, that is installed on a system and appears benign, but in actual it is the addition of malicious which unexpected modifications in config files and unusual activity even when the computer is idle are strong signs that a Trojan exists on a system. and other options are not correct that can be described as follows:

  • In option A, It is a malware that is also known as Trojan.
  • In option B, It is malware, not a virus but the malware includes viruses.
  • In option C, It doesn't install spyware on the user's computer.
  • In option E, It doesn't use for enterprise networks to penetrate.
4 0
3 years ago
HELP QUICK!!!!!!!
iogann1982 [59]

Answer:

Number.

Letter is for columns, Number is for rows.

For example to find the cell on the fifth row, and 1st column, it would be A5.

6 0
2 years ago
Which is a good plan for backing up data?
Ymorist [56]
A, use external storage media such as CDs.
4 0
4 years ago
Which address correctly represents one that is composed of two halves, one assigned to a network adapter manufacturer, and the o
Vlad1618 [11]
 Media access control address
5 0
3 years ago
Other questions:
  • "Which hash algorithm's primary design feature is two different and independent parallel chains of computation, the results of w
    9·1 answer
  • You are going to buy a computer but first you want to do some research to help you select the best model everfi answer
    11·1 answer
  • On dynamic disks, the term partition is not used to define the space where a file system is installed. what term is used?
    6·1 answer
  • Which of the following devices are least likely to deny a connection inline when an attack is detected? (select 2)
    6·1 answer
  • A company operates on two types of servers: 2 large servers (L) and 4 smaller servers (S), with a combined total of 64GB RAM. Th
    9·1 answer
  • What is the feature of ram for beginners
    5·2 answers
  • Directions: Asba student of Contact Center Service, you already have an experience using different computer programs. Try to rem
    8·2 answers
  • At one college, the tuition for a full-time student is $6,000 per semester. It has been announced that the tuition will increase
    7·1 answer
  • What is the output of the following code:
    12·1 answer
  • Please help me with this question<br>it on the picture​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!