1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kitty [74]
3 years ago
9

Sebutkan contoh komputer analog, komputer digital, dan komputer hybrid

Computers and Technology
1 answer:
damaskus [11]3 years ago
3 0

Answer: the examples of analog computer is voltmeter

Example of digital computer is tablet,mobile etc

Example of hybrid computer is digital meters used nowadays in cars etc

You might be interested in
If the speakers are not working on a laptop, what could be the problem besides the speakers?
Elena-2011 [213]

Answer:

Sound card

Explanation:

In computer or laptop music or sound files are stored in digital form. Sound card is the the device that is used to convert the digital form of music into analog to produce the signal that is compatible with speaker or microphone.

If the speakers are not working on the laptop, means there is no sound produced on speakers. It means that sound card is not working properly.

8 0
3 years ago
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
Consider a three sequentially stepped process named as Process A, Process B and Process C. Input comes into Process A. Output fo
Novay_Z [31]

Answer: The process B is at the maximum steady state. A process is said to be at steady state if the variables that define the behavior of the system are unchanging

Explanation: From the Above

Process A takes 2 minutes per unit and hence can process (60/2) = 30 units per hour. Process B can process only (60/3) = 20 units per hour. Process C can handle (60/1) = 60 units per hour. the steady state output from this system is the smallest of the three, that is process B 20 units per hour

4 0
4 years ago
What is fair use?
koban [17]

Answer:

I believe its C

Explanation:

I'm sorry if its wrong...

8 0
4 years ago
Read 2 more answers
Which slideshows design can not be use?
Readme [11.4K]

Answer:

Is there suppose to be a pic ?

Explanation:

7 0
3 years ago
Other questions:
  • Collins and quillian explained the results of priming experiments by introducing the concept of _____ into their network model.
    12·1 answer
  • When using static ip addressing, software automatically configures the network connection on each device.?
    9·1 answer
  • Which type of peripheral is a keyboard?
    11·2 answers
  • Which language is the most popular language for writing apple os x?
    9·1 answer
  • Which option allows you to customize the order of your data ?
    8·2 answers
  • Fill in the function shopSmart(orders,shops) in shopSmart.py, which takes an orderList (like the kind passed in to FruitShop.get
    6·1 answer
  • How can rows be added to a table? Check all that apply
    13·2 answers
  • Write a C++ program that takes two numbers from the command line and perform and arithmetic operations with them. Additionally y
    11·1 answer
  • Data owners ensure that only the access that is needed to perform day-to-day operations is granted and that duties are separated
    10·1 answer
  • declaring a member as in the base class provides access to that member in the derived classes but not to anyone else.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!