1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
2 years ago
15

Which statement best describes the computers all around us?

Computers and Technology
1 answer:
Vika [28.1K]2 years ago
4 0

Answer: i think its They come in many different forms and sizes and are found practically everywhere.

You might be interested in
Four examples of computer virus​
Nikitich [7]

Virus that infects files. Macro Virus is a virus that attaches itself to an executable application. This type of virus is commonly found in Microsoft Word or Excel programs.... Browser Hijacker.... Web Scripting Virus.

Good morning, I hope this helps, and if you don't mind, please mark me as brainliest ❤

4 0
3 years ago
Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
kherson [118]

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

7 0
3 years ago
_______ is a communications protocol used to send information over the web. HyperText Markup Language (HTML). URL (Uniform Resou
nlexa [21]

TCP/IP is a communications protocol used to send information over the web.

Explanation:

TCP / IP, which stands for the Transmission Control Protocol / Internet Protocol, is a set of communication protocols used to connect internet network devices. The whole suite of the Internet Protocol — a set of rules and procedures — is commonly called TCP / IP.  

The TCP / IP protocol suite acts as a layer of abstraction between web applications and the routing / switching fabric. TCP / IP defines how data is shared over the internet by supplying end-to-end communications that specify how the data should be split into packets, signed, distributed, routed and received at the destination.

5 0
3 years ago
A _______ record is responsible for resolving an ip to a domain name.
katen-ka-za [31]
A DNS record <span>is responsible for resolving an IP to a domain name.
</span>The term DNS record denotes a database record, stored on DNS servers used to map a URL to an IP address. 
 The process is the following: the URL is entered and searched in the browser, that URL is forwarded to the DNS servers and then directed to the specific Web server<span>.</span>
3 0
3 years ago
Which one is not an operating system?1.mac 2.Microsoft office3.Iso.3.Android
quester [9]
It's either microsoft or office. Based on research I would say office.

I really hope this helps you! :-)
6 0
3 years ago
Other questions:
  • A(n) _______ created in Microsoft Word or another word-processing program works well as a shell for a PowerPoint presentation.a.
    9·1 answer
  • Software can be distributed on the web. <br> a.true <br> b.false
    12·1 answer
  • What is the command to use the memory diagnostics tool?
    11·1 answer
  • If you don't know whether to write too, two, or to, you should use the spell-checker to help you decide. true or false?
    7·1 answer
  • The cylinder head and engine block are completely sealed by a A. valve seal. B. head gasket. C. intake manifold. D. spark plug
    11·2 answers
  • Mac and PC .Which one is better for professional users, and why
    6·1 answer
  • Write a calculate_sq_inches_of_good_pizza function that accepts the diameter of a pizza and returns the area of the pizza minus
    7·1 answer
  • Which of the following is input devices? (a)Scanner (b) Keyboard (c) Both a and b (d) Plotter​
    5·1 answer
  • SOMEONE PLEASE HELP ME OUT WITH THIS PLEASE
    13·1 answer
  • How many MB are there in 1000 KB?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!