1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
san4es73 [151]
2 years ago
12

3 uses of a computer ​

Computers and Technology
2 answers:
Bezzdna [24]2 years ago
4 0

Answer:

learning, entertainment, working

GenaCL600 [577]2 years ago
3 0

Answer:

online bills payment

watching movies or shows

home tutoring

You might be interested in
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
Using powerpoint 2016, ethan develops a short five-slide presentation for his marketing project. â â powerpoint files consist of
Lady bird [3.3K]
b. Ribbons  - Powerpoint 2016 has a tabbed ribbon system that groups relevant menus together according to category. The ribbon contains a number of tabs, each having a separate group of commands. The tabs can be used to do most of the common tasks in Powerpoint.
8 0
3 years ago
Which university first developed the use of email?
Arte-miy333 [17]

Answer:

Massachusetts Institute of Technology (MIT)

Explanation:

4 0
2 years ago
In excel, an anchor($) allows you to?
mina [271]
Sssa rinmmy sihoa ihu hji ishoa io>?
6 0
3 years ago
Which type of partitioning is performed onRelation-X?
goldenfox [79]

Answer: B) Vertical Partitioning

Explanation:

As, vertical partitioning is performed on Relation X, it is used for dividing the relation X vertically in columns and it involves creation of tables and columns. They also use some additional tables to store left out columns. We cannot partition the column without perform any modification of value of the column. It only relies on keeping the particular attributes of relation X.

7 0
2 years ago
Other questions:
  • WordArt styles allow you to add ____.
    9·1 answer
  • Ou have just set up a network that will use the tcp/ip protocol, and you want client computers to obtain ip configuration automa
    9·1 answer
  • How can i learn about networks
    15·1 answer
  • When are number list generally used ?
    10·1 answer
  • Would anyone know this
    10·2 answers
  • 8.7 Code Practice Question 3
    14·2 answers
  • Why is OS important in every data processing system? <br>Please Answer Fast! ​
    10·1 answer
  • Which of the following statements best reflects the pros and cons of overtime potential for a line installer or repairer?
    15·1 answer
  • Cleo is new to object oriented programming. which type of action can be taken on on object?
    14·2 answers
  • ????????????helpppp please
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!