1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
8

People can use computers for sending ....... writing reports, listening to music and playing games. ​

Computers and Technology
2 answers:
liq [111]3 years ago
8 0

Answer:

  • People can use computers for sending<u>   </u>MESSAGES'TEXT'EMAILS<u>   </u>,writing reports,listening to music and playing games....

Alex777 [14]3 years ago
3 0

Answer:

the answer is messages, emails, texts

Hope This Helps!!!

You might be interested in
In today's computers, the CPU tells _______________ the clock speed it needs, and the clock chip then automatically adjusts for
Molodets [167]

Answer:

the motherboard

Explanation:

The Motherboard, also called motherboard and motherboard, is a board that contains a printed circuit and to which all the components that make up a computer are connected. Among that series of integrated circuits that it has installed is the chipset, which is the connection center between the computer, RAM, expansion buses and other devices.

On the other hand, the motherboard includes software that is popularly known as BIOS and that allows to carry out the basic functions, such as: device tests, keyboard operation, video, operating system load and device recognition.

Then, the typical components of a motherboard are the following: one or more power connectors, the CPU socket, the RAM slots and the chipset.

3 0
4 years ago
Consider an individual who wishes to ensure that their information remains secure and confidential, possibly to secure their per
EleoNora [17]

In terms of leaving evidence on the system,  their key concerns is their data protection and someone hacking into the system or reading their browsing history to use it against them.

<h3>What is system hack?</h3>

System hacking is a term that connote when a person or a computer user has a compromise between computer systems and software that tends to access the target computer and steal their information or others.

In terms of leaving evidence on the system,  their key concerns is their data protection and someone hacking into the system or reading their browsing history to use it against them as well as their privacy been exposed.

Learn more about system hack from

brainly.com/question/13068599

#SPJ1

7 0
2 years ago
Identify the selector in the following CSS code:
SashulF [63]

Answer:

The right answer is: Option A. h3

Explanation:

The purpose of using selectors in CSS is to find the elements in the HTML page to which the formatting will be applied.

Different type of selectors are used in CSS.

In the given code, h3 is the selector.

All the <h3> elements on the page will be of orange color and will have font size 12.

Hence,

The right answer is: Option A. h3

6 0
3 years ago
_____________ data is what is translated to digital format so it can be stored in a computer.
ladessa [460]

Answer:

"Analog" seems to be the appropriate choice.

Explanation:

  • Data estimation or representation by purposes of one sometimes more physical characteristics which can convey any information on a continuum of severity.
  • Analog data or information is information that is expressed physically. At which digital information is a series of individual symbols, analog data, if the substrate loops on even a vinyl record, the magnetic disks on a VCR compilation, and perhaps other non-digital material, is contained in physical media.

4 0
3 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Other questions:
  • What is the purpose of a decision support system?
    13·1 answer
  • Give two reasons why it is important to upgrade your browser when a new version becomes available.
    8·1 answer
  • What is a close-up shot, and when it is an appropriate shot choice in a film?
    6·1 answer
  • Why is fluency in information technology becoming increasingly important for many college majors?
    9·2 answers
  • One of the prominent movies released in the 1950s is
    15·2 answers
  • Lan is working on a project report that will go through multiple rounds of
    10·1 answer
  • an individual’s Body Mass Index (BMI) is a measure of a person’s weight in relation to their height. it is calculated as follows
    6·1 answer
  • What is an example of an attribute for a screen object
    14·1 answer
  • Which of the following is true of a procedure? Check all that apply.
    10·2 answers
  • you have just finished developing a new application. before putting it on the website for users to download, you want to provide
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!