1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
2 years ago
11

Which computer discipline involves the widest scope of computer-related

Computers and Technology
2 answers:
noname [10]2 years ago
5 0

Answer: D, computer science

Explanation: Computer engineering is a specific field of computer science, as well as B and Software Engineering

Oliga [24]2 years ago
4 0

Answer:

D. Computer science.

Explanation:

You might be interested in
What is a rigid layer that surrounds plant cell.
Helen [10]
The plants cell wall.
5 0
3 years ago
Laptop computers, personal digital assistants, and cellular phones were all readily accepted and diffused in U.S. markets where
astra-53 [7]

Answer: Compatibility

Explanation:

 According to the question, the given products are offering compatibility with the customers needs and the priorities of the consumers. The customers comparability means the degree of the product that fit between customers expectation and the capability of serving by the operation team.

The customers expectation mainly reflected both the present and the past evaluation of the products and the user experience. The compatibility of the customers needs is to meet the quality, value  and the service of the product.

8 0
3 years ago
At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?
Natalka [10]

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

6 0
3 years ago
Which TWO of the following are input devices that are parts of a laptop computer?
vampirchik [111]

Answer:

Mouse and Keyboard.

3 0
3 years ago
Read 2 more answers
To change the formatting of text from calibri to arial, which tool should you use?
Serjik [45]

Answer:

The Font Tool

Explanation:

Both Calibri and Arial are default fonts, thus changing from calibri to arial requires the font tool

7 0
2 years ago
Other questions:
  • Which network component allows computers to communicate on a network without being connected directly to each other?
    9·1 answer
  • when a page contains function is loaded the browser by passes the function without running it - true or false
    7·1 answer
  • Select the information protection item that ensures that information is correct and that no unauthorized person or malicious sof
    9·1 answer
  • You use a __________________ tool to push wires into a keystone jack and cut off the end of the wires.
    7·1 answer
  • In Microsoft Word, when you highlight existing text you want to replace, you are in
    12·1 answer
  • An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel i
    12·1 answer
  • PLEASE HELP QUICK WILL GIVE BRAINLY
    6·1 answer
  • Ile 1 cm<br> ?<br> 50 m<br> The an
    5·2 answers
  • What integer is represented by the following 8-bit twos complement representation: 1011 0000 ? (Enter your number in decimal, an
    6·1 answer
  • What is the software that provides the mechanisms to access a database called?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!