1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dominik [7]
2 years ago
6

GIVING BRAINLIEST! AND 100 POINTS.

Computers and Technology
2 answers:
Natalka [10]2 years ago
5 0

Answer:

Communication

Explanation:

Communication is the most common thing to do on your device .

jok3333 [9.3K]2 years ago
5 0

Answer:

Communication as it edged out school by one vote.

Explanation:

You might be interested in
Why is it important to ground both computers and network devices?
julia-pushkina [17]

Answer:

Ground the electrical equiptment so no power surges come through and fry the equiptment if there is a storm etc.

Explanation:

4 0
2 years ago
Intelligent automation expands on simpler forms of automation through the use of which technology?
Firlakuza [10]

Answer:

Intelligent Automation (IA) is a combination of Robotic Process Automation (RPA) and Artificial Intelligence (AI) technologies which together empower rapid end-to-end business process automation and accelerate digital transformation..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

3 0
2 years ago
Can we update App Store in any apple device. (because my device is kinda old and if want to download the recent apps it aint sho
DIA [1.3K]

Answer:

<h2><em>F</em><em>o</em><em>r</em><em> </em><em>m</em><em>e</em><em> </em><em>y</em><em>e</em><em>s</em><em> </em><em>i</em><em> </em><em>g</em><em>u</em><em>e</em><em>s</em><em>s</em><em> </em><em>y</em><em>o</em><em>u</em><em> </em><em>c</em><em>a</em><em>n</em><em> </em><em>u</em><em>p</em><em>d</em><em>a</em><em>t</em><em>e</em><em> </em><em>a</em><em>n</em><em> </em><em>a</em><em>p</em><em>p</em><em> </em><em>s</em><em>t</em><em>o</em><em>r</em><em>e</em><em> </em><em>i</em><em>n</em><em> </em><em>a</em><em>n</em><em>y</em><em> </em><em>d</em><em>e</em><em>v</em><em>i</em><em>c</em><em>e</em></h2><h2><em>I</em><em>'</em><em>m</em><em> </em><em>n</em><em>o</em><em>t</em><em> </em><em>s</em><em>u</em><em>r</em><em>e</em></h2>

<h2><em>×_× mello ×_×</em></h2>
4 0
3 years ago
State The function<br>of floppy disk​
Romashka [77]

Answer:

A floppy disk drive (FDD) is a small disk drive used in computers for data transfer, storage and backup of small amounts of data, as well as installation of programs and driver updates. A floppy disk drive accesses data recorded on small, removable diskettes known as floppy disks.

8 0
3 years ago
To lock down security settings on an individual system on a network, what would you use?
professor190 [17]

Answer:

The answer is "LSS(Local Security Settings)".

Explanation:

The LSS stands for Local Security Settings, it is a set of information about the security of a local computer. LSS allows a feature, that the information on the protection of a local computer is a local safety policy of a device.

  • This option is available on windows.
  • The local security policy information includes the domains, that trust login attempts to be authenticated.

 

8 0
3 years ago
Other questions:
  • How does the use of modules provide flexibility in a structured programming design?
    14·2 answers
  • A wet-carpet cleaner that carries it's own water supply has water pressure created by a.
    11·2 answers
  • What is the main storage location of a computer
    13·1 answer
  • How to improve and create beautiful graphic
    10·1 answer
  • A technician would like to have the ability to add physical hard drives to a Storage Spaces storage pool at future times on an a
    6·1 answer
  • What is unique about the TODAY and NOW functions?
    15·2 answers
  • Which is the most popular language used in game programming?
    5·2 answers
  • Select one of the wrong answer from question 1 and explain why it is ironic.
    7·1 answer
  • Which type of protocol allows for a secure data transmission using encryption methods?
    7·1 answer
  • By definition, what is the process of reducing security exposure and tightening security controls?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!