1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
noname [10]
3 years ago
7

What is a closed system?​

Computers and Technology
1 answer:
RoseWind [281]3 years ago
7 0

Hope it helps yah (◕ᴗ◕✿)

You might be interested in
Can i get any information on this website i'd like to know what its for ?
zloy xaker [14]

Explanation: torsearch.org is a safe search engine mainly used for dark wed purposes. It does not track your location nor give any personal information.

8 0
3 years ago
What is a good project I can do for Artificial Intelligence? It has to be some type of Technology that covers Artificial Intelli
Allisa [31]
Look at the fields that utilize artificial intelligence and expand further. 

You can talk about A.I. being used to operate on patients in complex surgeries. 

A.I. in space exploration or roaming in the deep trenches of our oceans looking for information about our planet.

A.I. in law enforcement and rescue squads.

A.I. in security.

A.I. in engineering. 

Programming of A.I.

Integration of A.I.

Outlook of A.I. in our future and how it may be used.

Artificial Intelligence in warfare.


7 0
4 years ago
What type of organism forms the base of food webs?
kotegsom [21]
A producer <span>forms the base of food webs</span>.
7 0
3 years ago
What are some of the issues that create conflict in the future and why?
Stells [14]
111111111111111111111
7 0
3 years ago
Which of the following is the single best rule to enforce when designing complex passwords?
saw5 [17]

Answer:

B. Longer passwords

Explanation:

If the password is longer, it requires more incorrect attempts to find it, so the system could identify a potential hacker attempt. Smaller but more complex passwords could be identified by mistype or forgotten passwords.

3 0
3 years ago
Other questions:
  • Exchanging which type of data uses the least bandwidth?
    14·1 answer
  • What is the maximum number of columns in a spreadsheet that you can sort in one instance in software like OpenOffice Calc?
    7·2 answers
  • When creating a new user in linux, after entering the name, the username box:?
    9·1 answer
  • This is not homework but how do you fix this I’ve tried everything
    9·1 answer
  • Write a program that reads a stream of integers from the console and stores them in an array. The array is then analyzed to comp
    10·1 answer
  • A domain name is used to: *
    15·1 answer
  • PLEASE HELP what is the mechanical advantage of a wheel with a radius of 8.0 cm connected with a axle with a radius of 2.5 cm?
    12·2 answers
  • In many programming environments today, one language translates the programmers' code into a different language before the compu
    6·1 answer
  • Write a program in C++ that will ask the user to enter a five-digit integer. The program will detect if the number entered is a
    6·1 answer
  • The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!