1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tomtit [17]
2 years ago
7

When individuals are purchasing a computer, they sometimes might get the most expensive computer they can afford. Why might this

not be a good idea?
Computers and Technology
1 answer:
timama [110]2 years ago
8 0

Answer:

Expensive is not always better

Explanation:

So I build 2 computers ok

Computer 1: Price 1,999$

<u>Whats Included:</u>

  • Antivirus
  • Anti-Over-Heat
  • Windows 8 Operating Software
  • Free VPN (For Life)
  • 24/7 Support
  • 1 year warranty
  • 3/5 Star Reviews | Main Review Type: Parts Breaking Inside

Computer 2: Price 799$

<u>Whats Included:</u>

  • Anti Virus
  • Anti Over-Heat
  • 1 Year Warranty
  • Windows 10 Operating Software
  • 24/7 Support
  • 10 Year Warranty
  • 4/5 Star Reviews | Main Review Type: Runs Smooth
  • No VPN

<h2>So Computer 2 Has better reviews and a 10 year warranty over computer 1's 1 year warranty</h2>
You might be interested in
How does computer network work in a paragraph
Maksim231197 [3]

You go in to the networks crosh/Linux and you insert the info you want in code

7 0
3 years ago
How can earn more answer from brainly less than two minutes, please
Andrei [34K]
You have to answer other people’s questions.
6 0
3 years ago
What technique is most commonly associated with the use of malicious flash drives by penetration testers
nasty-shy [4]

Answer: Distributing malicious flash drives in a parking lot or other high-traffic area, often with a label that will tempt the person who finds it into plugging it in, is a technique used by penetration testers.

Explanation:

4 0
2 years ago
Please help me very important
3241004551 [841]

Answer:

C, Or D.

Explanation:

<em>Because A speed enhancing hard drive Can store any type of quick file if you just click on it will load fast. Same thing goes for a hard drive but you have to transfer the file</em>

4 0
2 years ago
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
morpeh [17]

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
4 0
3 years ago
Other questions:
  • WILL MARK BRAINLIEST HELP
    8·2 answers
  • How do i show all emails from same sender in outlook
    13·2 answers
  • Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his n
    11·1 answer
  • If a person sends email from a school computer or a business computer, should that message be considered private?
    8·2 answers
  • Andy is trying to put together a holiday gift knapsack (with W=8) for Sarah. He has n items to choose from, each with infinitely
    15·1 answer
  • A user calls you and says that when they try to connect to the internal website, they are prompted for authentication. The user
    14·1 answer
  • An online journal or diary you create to share your thoughts, opinions and personal news is referred to
    13·1 answer
  • Zack sees an online contest. He could win $10,000 instantly! On the sign-up form he enters his name and email address. He is als
    9·1 answer
  • When it comes to credit scores, why is having a
    9·1 answer
  • From which os did windows xp evolve?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!