Answer:
I say that this would be data. It is the one that makes the most sense, because in math, that would be the data that you may not know what to do with....YET!! Hope this was helpful!
Answer:
the answer is information
Explanation:
What three things in the third generation of computing helped get programming enthusiasts more involved with computers? Select 3 options.
smaller-size computers
iPods
integrated circuit
Windows 10
lower prices for computers
Answer:
ipods, windows 10,intengrated circut
Explanation:
Answer:
Explanation:
iPods, integrated circuit, and Windows 10 i think
What is the purpose of the PC troubleshooting process? Select two answers. BRAINLIEST to who gets it right
Answer:
identify...
solve...
Explanation:
Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system.
Answer:
Identify Problems and Fix Broken Components
Explanation:
"Critical troubleshooting will automatically fix things like corrupt settings that keep critical services from running, make adjustments to work with your hardware, or make other specific changes required for Windows to operate with the hardware, apps, and settings you've selected." Cited from Microsoft Support's Website
The brainly home page uses about 112% of my cpu. (On chromebook) any ideas to help increase performance?
This is for a test HELP!!!Sorry this was meant for history
What is a characteristic of a house slave?
A:children put into the work force at an early age
B:received better food than other slaves
C:lived in a certain section of town
D:received a portion of their money
Answer:
B
Explanation:
B
Can somebody help me? Thank you. ASAP
Who can name this song? THIS MY FAVORITE SONG!!! Trivia of the day: Level: EASY
This will at least get you 5 pts if you answer.
Lyrics:
Woo, woo
I pull up like
How you pull up, Baby? How you pull up? (Oh)
How you pull up? I pull up (Seth in the kitchen)
Let's go
bro this scared me, i thought i just got hacked, could someone explain why when i went to ask a question, it kicked me out my acc and kept saying sign up? i close that app and reopend it and did it about 3 more times until it finally worked, im just very confused. does anyonw know what happend..???
dont worry it's just a bug in the system..
True/False: Software is needed in order for hardware to operate.
Answer:
I think it is true sorry if it's wrong
Answer:
the answer is true
Explanation:
hope this helps
What will be the result of the following lines of CSS?
body{
background-color:yellow;
}
A.
The background of the header will be yellow.
B.
The text will be highlighted yellow.
C.
The background of the body of the webpage will be yellow.
D.
The photo will change to a yellow box if the user clicks on the photo.
Answer:
C.
Explanation:
The correct option that explains the result of the given lines of CSS is:
C. The background of the body of the webpage will be yellow.
The CSS code provided sets the background color of the body element to yellow. The "body" selector targets the entire body of the webpage, and the "background-color" property sets the background color to yellow. This means that the background of the entire webpage will be displayed in yellow.
Answer:
C. The background of the body of the webpage will be yellow.
Quick, answer this please! What happens if you answer bot questions with low points? Like they say they would give you 10+ points but they only have 5 points? I am afraid I might get h a c k e d
Answer:
Hello! I haven't been h a c k e d yet so I'm pretty sure its safe.
Explanation:
Which of the following lines of code creates a division called answer?
A.
B.
C.
D.
Answer:
Explanation:
Write 9 words but each word starting with a letter of computer? After your finished the first letter of each of your words should spell computer.
Answer:
C- rippledO- utstandingM- agicalP- eaceU- npredictableT- riumphE - xcellentR- obustExplanation:
Acronym- a word that composes of long words that start with its initial letter.Example: OTG (on the go)\(\tt{ \green{P} \orange{s} \red{y} \blue{x} \pink{c} \purple{h} \green{i} e}\)
How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!
A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.
B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.
C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.
D)esident viruses load themselves into memory while non-resident viruses find networks to infect.
Answer:
The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.
What is the purpose of lookup tables in spreadsheet software?
A. They allow the user to retrieve information from another location
in a table.
B. They allow the user to lock cells that contain information that
remains consistent.
C. They allow the user to create a graphic representation of a
selected table.
D. They allow the user to convert foreign currencies.
Answer:
A. They allow the user to retrieve information from another location
in a table.
Explanation:
The purpose of lookup tables in a spreadsheet software is that: A. they allow the user to retrieve information from another location in a table.
What is a spreadsheet software?A spreadsheet software refers to a type of software program which is typically designed and develop with cells that are arranged in a tabulated format in rows and columns, so as to do the following on a data:
SortCalculateFormatArrangeIn conclusion, the purpose of lookup tables in a spreadsheet software such as Microsoft Excel is that they allow end users to retrieve information from another location in a table.
Read more on spreadsheets here: https://brainly.com/question/4965119
#SPJ2
When Eliza was first written (in 1966), some people thought it seemed human. Did Eliza seem human to you? Why or why not?
Answer:
yes she is a real person she had a son named Phil and her husband was alexander Hamilton he died in a duel with the vice president Aaron burr
there son died in a duel two so Eliza was just alone in the world with out her some and husband she ran a orphanage and saw all of the kids and it reminded her of Alex
Explanation:
Answer:
yeah shes human i refuse to think shes not
Explanation:
In the context of outside influences on research, what is the difference between maturation and attrition?
A. Maturation is the decrease in the number of subjects studied over time; attrition is the change in subjects over time.
B. Maturation is the change in subjects over time; attrition is the decrease in the number of subjects studied over time.
C. Maturation is the change in subjects over time; attrition is the change in subject responses due to world events.
D. Maturation is the change in subject responses due to world events; attrition is the change in subjects over time.
help please!!
shar is thinking about the amount of time she spends connected to technology, on her studies, and on personal preferences and relaxation. What is her best strategy for accomplishing all of these tasks?
She should focus more on technology
She should avoid all extremes and seek a balance
She should avoid personal time and focus on her studies
she should put all her emphasis on being connected to technology
Answer: The second one :)
She should avoid all extremes and seek a balance
Explanation:
The other options only cover 1 or a few of the answers.
The best strategy for Shar would be to avoid all extremes and seek a balance.
What is technology?Technology refers to the tools, systems, and methods used to create, process, and store information.
It encompasses a wide range of devices and systems, including computers, smartphones, tablets, software applications, social media platforms, and more.
The best strategy for Shar would be to avoid all extremes and seek a balance.
It's important to recognize that technology is a valuable tool, but it's also important to ensure that it doesn't consume all of your time and energy.
Shar should allocate time for her studies and personal preferences and relaxation while also using technology as a means to support those activities.
Thus, this will help her maintain a healthy balance between her academic and personal life while utilizing technology as a useful tool.
For more details regarding technology, visit:
https://brainly.com/question/9171028
#SPJ2
(I made this up teehee) what anime is katski bakugo from
Is nobody actually on right now? I actually need this done ASAP I would greatly appreciate it!!
1. No one can have the same thing as me
2. My work is protected under a copyright agreement
3. My work will not be used unless I agree upon it
4. legal action can be taken is the work is illegally used
not sure about the next one
Answer:
Answer:
1:
The four factors judges consider are:
The purpose and character of your use
The nature of the copyrighted work
The amount and substantiality of the portion taken, and
The effect of the use upon the potential market.
2:
Originality,
Creativity,
Fixation
3:
A copyright is a type of intellectual property that gives its owner the exclusive right to copy and distribute a creative work, usually for a limited time. The creative work may be in a literary, artistic, educational, or musical form.
Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers
Answer: D
Explanation: Hackers are the only type of cyber criminal that monitors your computer
why would it be essential for the successful A/V technician to participate in additional coursework, presentations, and seminars offered by equipment manufacturers as well as annual conferences attended by colleagues in the industry
Answer:
its not loading for me :/
Explanation:
Answer:
they can get a better background of what they're learning about
Explanation:
I NEED IT NOWW
what task does a sensor perform in a closed loop feedback system a: measures the variable that represents the system state B: compares the variable to a reference variable C: defines the reference variable D: feeds d at a back into the system so that it can reach the desired state
Answer: the answer ur looking for is option : a
Answer:
a: measures the variable that represents the system state
Explanation:
Why isn't my brainly post being answered?
Try deleting then reposting, it may not always pop up in new questions, I will have a look at the question anyway.
Which is an example of an effective study skill?
Answer:
the making note cards and quizzing yourself
Explanation:
Carina's computer is turning off without warning. Which of the following steps should she take to troubleshoot the problem?
A: Try several fixes at once.
B: Uninstall the anti-virus software.
C: Check the cable connections.
D: Remove devices.
Q: Philip wants to be an architectural drafter, but he does not like working on computers. He prefers drafting by hand. Based on this lesson, what would be the best advice you could give Philip?
A. Become a drafter, and work by hand as part of a cultural project.
B. Learn the computer drafting programs. Computers are always going to be a part of your life
C. Become a drafter, and keep working by hand. Some people will always prefer “old-school” methods.
D. Find a different job for which you can use hand drafting skills, because they are not competitive in the drafting occupation.
PLEEZE I REALLY NEED THE RIGHT ANSWER! WORTH 20 POINTS AND WILL GIVE BRAINLIEST!
what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls
Answer: Insert ribbon > table drop down menu
Explanation:
Answer:Insert ribbon > table drop down menu
Explanation:
An example of how a merge code would appear in a letter would be _____.
Answer:
Space blank
Explanation:
It means the question needs you to answer the question
Answer:
An example of how a merge code would appear in a letter would be C i.e. /University_Name/. Explanation: Merge codes help speed up the method of making letters by inserting data into your letters.
Explanation:
I hope this helps
what are some basic commands to remember in terminal? windows 10
please help if you know
Answer:
If you just need a few, maybe this can help.
Explanation:
Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.
Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.
Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.
Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.
Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.
List steps to protect digital data from compromise. List steps to protect digital data from compromise.
Answer:
1. apply software updates
2. protect password
3. disable lock screen notification
4. lock your apps
5. keep your browsing to yourself
6. encrypt your data
7. back it up
Explanation:
all above
Answer:25 Jan 2021 — Securing Your Devices and Networks · 1. Encrypt your data. · 2. Backup your data. · 3. The cloud provides a viable backup option. · 4. Anti-malware ...
Data Protection Tips for Mobile Devices · Protecting Your Identity
Explanation:25 Jan 2021 — Securing Your Devices and Networks · 1. Encrypt your data. · 2. Backup your data. · 3. The cloud provides a viable backup option. · 4. Anti-malware ...
Data Protection Tips for Mobile Devices · Protecting Your Identity