1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
brilliants [131]
3 years ago
13

What computer is designed for particular application​

Computers and Technology
1 answer:
Karo-lina-s [1.5K]3 years ago
5 0

Answer: Applications for desktop or laptop computers are sometimes called desktop applications, while those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it

Explanation:

You might be interested in
Which domain refers to the equipment and data an organization uses to support its IT infrastructure. It includes hardware, opera
vovikov84 [41]

Answer:

D. System/Application Domain

Explanation:

A system or application domain is used by an organization to supports its IT infrastructure, holding all the business critical mission system, applications and data. All the resources of the company are contained in this domain, and is accessible by a member.

LAN to WAN domain links the company's infrastructure or local area network to a wide area network or the internet. The WAN domain simply holds publicly the data of an organisation, while remote access domain is meant for a small group of workers in the office or working from home.

8 0
3 years ago
True or false Rough estimates indicate that point suspension of your driver's license can average anywhere between $3,000+ and $
leva [86]
True however it’s also depends on where you live but for this purpose it’s true
7 0
3 years ago
Which of the following is normally mutually exclusive<br> Read only files<br> Printer<br> WIFI
marin [14]

Answer:

the answer is going to be printer

5 0
2 years ago
_____________is the act of protecting information and the systems that store and process it.A.Information systems securityB.Poli
mylen [45]

Answer:

A. Information System Security (ISS)

Explanation:

Information System security is a very important security in any organization.

The main focus of Information system security is the system itself and the information that the system possesses, processes and stores.

Information system security, or infosec for short, is the modality involved in protecting information and in making it available.

With Infosec,

1. an organization's ability to perform is protected

2. the data an organization uses is protected ensuring integrity

3. programs, applications and technology implemented on an organization's systems are safely used.

Hope this helps!

3 0
3 years ago
Read 2 more answers
What is the hexadecimal equivalent for 11000101?
Makovka662 [10]

Answer: C5₁₆ ⇔ 11000101₂ ⇔ 197⏨

Explanation: 11000101 is a binary number

it's equivalent decimal number is

1x2⁷+ 1x2⁶+0x2⁵ + 0x2⁴+0x2³+1x2²+0x2¹+1x2⁰ = 128+64+4+1 = 197

Hexadecimal system has equivalents in decimal system

0 ⇔0

1 ⇔ 1

2 ⇔ 2

3 ⇔ 3

4 ⇔ 4

5 ⇔ 5

6 ⇔ 6

7 ⇔ 7

8 ⇔ 8

9 ⇔ 9

10 ⇔A

11 ⇔B

12 ⇔C

13 ⇔D

14 ⇔E

15 ⇔F

197 ⇔??

To convert this decimal number in a hexadecimal number we have to divide it by 16

197/16

12,...

the quotient without the decimal part is multiplied by 16 and subtracted from the number

12x16 = 192

197-192 = 5

Then this number can be expressed as 12x16¹ + 5x16⁰ = 192 + 5 = 197

But in the hexadecimal system there are not digits > 9 , so 12 ⇔ C

197⏨ = Cx16¹ + 5x16⁰ = C5₁₆

Answer: C5₁₆ ⇔ 11000101₂ ⇔ 197⏨

\textit{\textbf{Spymore}}

8 0
3 years ago
Other questions:
  • In the windows firewall, any rules preceded by a __________ checkmark have not been enabled. black gray green red
    13·1 answer
  • What are three softwares for cloud computing
    8·1 answer
  • Which ofthe following sentence beginnings would be best to use in apersuasive request?
    8·1 answer
  • You want to use a terminal program to terminal into a cisco router. what protocol should i use
    8·1 answer
  • "What technology will examine the current state of a network device before allowing it can to connect to the network and force a
    6·1 answer
  • Abby wants to simply share a snapshot of her calendar with another user. Which option should she choose to achieve
    15·1 answer
  • Copyright laws protect:This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task a
    6·1 answer
  • Explain how files can be identified as entities on the magnetic surface?
    8·1 answer
  • I have this questions i need to make it in a report format pages of atleast 3 pages and maximum of 5 pages​
    7·1 answer
  • NO LINKS Please
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!