1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex Ar [27]
2 years ago
14

1. (A) What do you mean by computer? Discuss the use of computer in daily life.

Computers and Technology
2 answers:
alina1380 [7]2 years ago
5 0

Answer:

an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

Some people use a computer to take online classes.Computers have many other uses at home like financial calculations also. You can also access banking and business services from home via the internet with the help of a computer.

Goshia [24]2 years ago
3 0

Answer:

A computer is <em>an</em> <em>electronic </em><em>device </em><em>that </em><em>manipulates </em><em>information </em><em>or </em><em>data.</em><em> </em>

<em>We use computers in schools and colleges all around the world. </em>

<em>Computer technologies are important to teach students digitally and creatively with data visualization. In a classroom, students used computers to explore their creativity and imagination.</em>

You might be interested in
The button for adding a picture to a spreadsheet is found in the
boyakko [2]
The answer is Insert Tab. This is the button to add a picture to a spreadsheet.  <span>Click </span>Insert to add something to a spreadsheet. This includes pictures, shapes, charts, links, text boxes, video and more. <span>The </span>Insert Tab<span> is used to </span>insert<span>    different features such as tables, pictures, clip art, shapes, charts, page numbers, word art, headers, and footers into a document. </span>
6 0
3 years ago
opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
Alekssandra [29.7K]

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

  1. General Policies
  2. Server Policies
  3. VPN Policies
  4. Back-Up Policies
  5. Firewall Access and Configuration Policies

Cheers!

5 0
3 years ago
HELP ME ASAP
ruslelena [56]

it is title page and give me a ❤

3 0
3 years ago
Which options are available in the Conditional Formatting dialog box? Check all that apply.
IrinaVladis [17]

Answer:

There are several options within this dialog box for applying Conditional Formatting ☼ Click the desired option under the Select a Rule Type list. ☼ The bottom portion of the dialog box will change depending on the Rule Type that was selected. ✞ Click Format Only Cells That Contain under Select a Rule Type

6 0
3 years ago
Read 2 more answers
What is the purpose of the fit to size feature in Word?
Olegator [25]

Answer : computer

Explanation:

please mark me as brilliant

3 0
3 years ago
Other questions:
  • Write a program that asks for 'name' from the user and then asks for a number and stores the two in a dictionary (called 'the_di
    9·1 answer
  • A custom date format set for a date/time field that contains the symbols mmm/dd/yy would display the date as ____.
    12·1 answer
  • Which of the following is a key component to your individual internet safety? government regulations
    13·1 answer
  • To keep a desktop computer or a server powered up when the electricity goes off in addition to protection against power fluctuat
    8·2 answers
  • You are an administrator for contoso.com. you have two servers called server1 and server2 that run windows server 2012 and have
    9·1 answer
  • ____ are programs that run independently and travel between computers and across networks.
    7·1 answer
  • Why do we need vram​
    6·1 answer
  • Generally considered to be the most important information security policies, what item below defines the actions a user may perf
    11·1 answer
  • To find detailed information about the origin of an email message, look at the ________________.
    11·1 answer
  • Which source would provide the best way to find valid information about climate change
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!