1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VikaD [51]
3 years ago
12

What is a computer??????????????????????????????????????????????????????????

Computers and Technology
2 answers:
Andreas93 [3]3 years ago
6 0
It's a device programmed with only 1 and 0 (Plz mark brainliest if i helped!)
DerKrebs [107]3 years ago
5 0
A computer is a decive.
You might be interested in
The most common layout of keys on the keyboard is the _____ keyboard.
Alex
The most common layout is called "QWERTY" because it is the first six letters on the keyboard.
6 0
3 years ago
Read 2 more answers
Which actions can be performed on tables in Word? Check all that apply.
tigry1 [53]
✓ adding rows
✓ adding columns
✓ deleting rows
✓ deleting columns
✓ changing column width
✓ aligning tables
✓ converting tables to text
✓ converting tables to graphs

Believe it or not, all of these actions are possible in MS Word.
3 0
4 years ago
Read 2 more answers
Create a security management policy that addresses the management and the separation of duties throughout the seven domains of a
klio [65]

Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain.

Explanation:

User Domain : The User Domain covers all theusers (of any rank) that haveaccess to the other six domains.

RISKS:

  • User can destroy data in application(intentionally or not) and delete all
  • User can insert infected CD or USBflash drive into the work computer

Workstation Domain : A computer of an individual user where the production takes place

RISKS:

  • The workstation’s OS can have a known software vulnerability thatallows a hacker to connect remotelyand steal data.
  • A workstation’s hard drive can fail causing lost data

LAN Domain : Contains all of the workstations,hubs, switches, and routers. TheLAN is a trusted zone

RISKS:

  • A worm can spread through the LANand infect all computers in it.
  • LAN server OS can have a knownsoftware vulnerability.

WAN Domain : Stands for Wide Area Network and consists of the Internet and semi-private lines

RISKS:

  • Service provider can have a major network outage.
  • Server can receive a DOS or DDOS attack.
  • A FTP server can allow anonymously uploaded illegal software

LAN / WAN Domain : The boundary between the trusted and un-trusted zones.The zones are filtered with a firewall

RISKS:

  • Weak ingress/egress traffic filteringcan degrade performance.
  • A firewall with unnecessary portsopen can allow access from the Internet

System / Application Storage Domain : This domain is made up of user-accessed servers suchas email and database

RISKS:

  • A fire can destroy primary data
  • A DOS attack can cripple the organization’s email

Remote Access Domain  :The domain in which a mobileuser can access the local network remotely, usually through a VPN

RISKS:

  • Communication circuit outage candeny connection.
  • Remote communication from officecan be unsecured.
  • VPN tunneling between remotecomputer and ingress/egress routercan be hacked
6 0
3 years ago
PLEASE BE CONFIDENT ABOUT YOUR ANSWER
Zigmanuir [339]

Answer: d. should be lowercase.

Explanation:

ID attributes are case sensitive for the most part - DOM and Java Script - which means that the ID attribute does not always have to be lowercase.

It can be uppercase as well. ID attributes can also start with a number and as of HTML 5 can start with a special character as well. Finally, the ID attribute must always be unique within each document.

8 0
3 years ago
Read 2 more answers
What lets you change the order of events in a game?
IRISSAK [1]
B the story board editor.
8 0
3 years ago
Other questions:
  • PriQueue inherits from Queue. In the implementation of the getMax() method in the PriQueue class, we need to read and write the
    5·1 answer
  • Ted reads a sentence: The man said that it would take 10 to 12 days for a reply. He believes the hyphen symbol can replace the w
    11·1 answer
  • Write an application that inputs three numbers (integer) from a user. (10 pts) UPLOAD Numbers.java a. display user inputs b. det
    10·1 answer
  • The data in a database management system that identifies the names of​ tables, fields in each​ table, and the properties of each
    13·2 answers
  • Working with do-while loop
    9·1 answer
  • Match each method of communication with its intended purpose.
    14·1 answer
  • Which is a connectionless protocol in the transport layer? What are the small chunks of data called?
    12·2 answers
  • Macro mode is used to take landscape photographs of subjects fairly far from the camera.
    12·2 answers
  • Which of the following is a quality of a mixed economy?
    5·1 answer
  • What is the most appropriate data type for each of these items?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!