1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hunter-Best [27]
2 years ago
13

Write down the importance of computers in this modern era of information technology in brief.​

Computers and Technology
1 answer:
Whitepunk [10]2 years ago
4 0

Explanation:

The computer system is not a simple machine. It is like a very modern and highly complex calc ulator. It can do

Computers are critical for communication and are the centerpiece of information technology. The early 1990s saw the emergence of household Internet use, which eventually spurred common use of email, we bsites, blo gs, social network ing, video c hat and Voice-Over-Inte rnet Protocol.

You might be interested in
The actual database of active directory shared resources is stored on one or more computers designated as:
Mila [183]

Solution:

It is done by Native Os X command line tool that can do this.

Active Directory, the data store contains database files and processes that store and manage directory information for users, services, and applications. A copy of the data store runs on each domain controller in the forest. The Active Directory data store is often referred to as the directory.

The ideal environment for the data store includes the following:

A domain controller running an operating system in the Windows Server 2003 family and containing hardware that meets the minimum hardware requirements of the edition of the operating system (Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition; or Windows Server 2003, Datacenter Edition)

For environments consisting of multiple domain controllers, the presence of a fully functioning Active Directory replication topology

For environments consisting of multiple domain controllers, the presence of a fully functioning File Replication Service (FRS) topology

A regular backup schedule

Regular monitoring of Active Directory, either through manual review of event logs or through an automated monitoring solution, such as Microsoft Operations Manager (MOM)

This is the required description describes the elements of the Active Directory data store, including its architecture, protocols, interfaces, logical structure, physical structure, processes and interactions, and network ports.


6 0
3 years ago
Which option will enable Mina to apply several formats to the spreadsheet cells at the same time?
madam [21]
Applying a cell style will enable Mina to apply several formats to the spreadsheet cells at the same time.  <span>To apply several formats in one step, and to make sure that cells have consistent formatting, you can use a cell style. A cell style is a defined set of formatting characteristics, such as fonts and font sizes, number formats, cell borders, and cell shading. </span>
4 0
4 years ago
Which of the following describes the term "false information?"
pav-90 [236]
Inaccurate and misleading
3 0
4 years ago
Rochelle knows that the music on her computer is stored in the form of numbers. Which hardware component processes these numbers
QveST [7]

Answer:

ALU: arithmetic logic unit

Explanation:

Hope this helps i dont know that much about thus unit but i am pretty sure im right

4 0
3 years ago
What could prevent ping or traceroute responses from reaching the originating device beside network connectivity issues?
zysi [14]
Many admins set their firewalls to drop echo-request packets to prevent their networks from being mapped via "Ping Sweeps".

A remote possibility is that there's too many hops between the source and target and the packet's TTL expires.
3 0
4 years ago
Other questions:
  • Sarah has to pick images that display camera care. Which images would she pick to show camera care?
    11·1 answer
  • What is the value of the variable result after these lines of code are executed?
    5·2 answers
  • Sentiment analysis algorithms use simple terms to express sentiment about a product or service, so ________ makes it __________
    13·1 answer
  • Information security is defined as practice of preventing unauthorized access, use, disclosure, disruption, modification, or ___
    6·1 answer
  • How can my computer catch a virus?
    13·1 answer
  • How to change default search engine in internet explorer 11?
    13·1 answer
  • Suppose you are given a sequence that is described by a formula, starting at index n=0. If you need to change the starting index
    6·1 answer
  • How much tabs can you open with 8GB of ram? ​
    6·1 answer
  • Which of the following can you use to judge source legitimacy?
    6·2 answers
  • What is a list of things we use programming for??? longest gets brainly
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!