1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
14

This computer is used by touching your finger.

Computers and Technology
1 answer:
Marrrta [24]3 years ago
8 0

Answer:

a tablet because it's controlled by the touch of a finger.

You might be interested in
Photographs, illustrations, and videos are increasingly created an and viewed in digital formats. True or False​
lutik1710 [3]

Answer:

I think it's True but I don't know sorry if I'm wrong

6 0
2 years ago
Read 2 more answers
Un comerciante de régimen código para comprar mercancías gravadas a un comerciante de régimen simplificado precio de venta al pú
Genrish500 [490]

Answer:

El valor sin impuestos de las mercancías era de $1.512.605.

Explanation:

Dado que un comerciante de régimen código para comprar mercancías gravadas a un comerciante de régimen simplificado pagó un precio de venta al público 1.800.000 incluido el IVA tarifa general (19%), para determinar el valor de las mercancías sin el impuesto incluido se debe realizar el siguiente cálculo:

1.19 = 1.800.000

1 = X

1.800.000 / 1.19 = X

1.512.605 = X

Por lo tanto, el valor sin impuestos de las mercancías era de $1.512.605.

5 0
3 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
RideAnS [48]

Answer:

True.

Explanation:

A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.

Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.

6 0
3 years ago
You'd like to create remarketing lists based on your customer's journey through your website so that you can target them with di
Marat540 [252]
The term homepage visitors <span>describes the users that visited your homepage, but didn't move any further into your site. 
</span><span>Homepage denotes the main initial web page of a website.
</span><span>The first web page people see when they arrive on a website is also known as the "landing page".</span>
4 0
3 years ago
Innovations for the printer? with date
oee [108]
1452,<span>guttenberg by a German (invention of printing<span>)

</span></span>
6 0
3 years ago
Other questions:
  • A modern information-processing model that views memories as emerging from particular activation patterns within neural networks
    6·1 answer
  • Which of the following is a valid variable name? a. salesTax b. input-string c. 25Percent d. double
    8·1 answer
  • People who enjoy working with their hands might enjoy a career as a/an
    9·1 answer
  • Which of the following is the BEST solution to allow access to private resources from the internet?
    9·1 answer
  • Please help. will give u brainliest!! khan academy computers and the internet!!
    12·1 answer
  • What is a cloud in the world of computing
    7·1 answer
  • 7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering personal i
    10·1 answer
  • HELP!!!!!!!
    8·1 answer
  • What steps can you take to secure your private information?.
    8·1 answer
  • TASK 1. JUMBLE ME! Direction: Arrange the jumbled letters to form a word. 1. PEREAM 2. RRENT CU 3. METREMO H 4. TORSISER 5. TANC
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!