1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
2 years ago
6

What are common considerations businesses need to make before purchasing new computers? Check all of the boxes that apply.

Computers and Technology
1 answer:
Sergeeva-Olga [200]2 years ago
8 0

Answer:

the first three

Explanation:

You might be interested in
In online education is intrinsically related to equity. Professionalism Communication Accessibility
ratelena [41]

Answer:

The correct answer is C. Accessibility.

Explanation:

Online education is understood as the educational system by which knowledge is acquired through the use of computer media in which students interact with teachers electronically without personally attending classes in person. This type of education has advantages and disadvantages: in terms of the pros, it is an education system that requires less time and mobility on the part of the student, thus facilitating the process of learning and making the times more effective, but in terms of its cons, online education is not always accessible, as in order to access it requires a certain connectivity capacity, that is, the provision of a computer and an internet network capable of guaranteeing the functioning of online educational systems.

In this context, accessibility is understood as the ability of each individual to acquire an online education through the use of the necessary means for this, so accessibility implies the possibility of accessing said electronic media. This is related to equity, as online education systems should be able to guarantee their use by means of equipment that is as less specific as possible so that any common person can access them.

7 0
3 years ago
Read 2 more answers
Elise has just edited two photos of her cat and three different photos of her dog. She needs to save all five of these photos in
Lera25 [3.4K]
<span>The best answer is A. cat_1, cat_2, dog_1, dog_2, dog_3. Filenames are preferably short and should state the obvious. They should be unique and distinct, with no any duplicates in any given file within the same folder. The other choices either have duplicates, vague or are way too long to be identified quickly. </span>

<span> </span>

7 0
3 years ago
Read 2 more answers
Which of the following defines a computer program?
andreev551 [17]

Answer:

A set of instruction given to computer

Explanation:

4 0
2 years ago
C:\windows\system32\drivers\etc\protocol is an example of a file ________. select one:
monitta

I guess the correct option is letter D.

C:\windows\system32\drivers\etc\protocol is an example of a file path.

5 0
3 years ago
Write bubblesort algorithm using random programming language
maks197457 [2]

Answer:

   n := length(A)

   repeat

       swapped := false

       for i := 1 to n-1 inclusive do

          <em> /* if this pair is out of order */</em>

           if A[i-1] > A[i] then

<em>                /* swap them and remember something changed */</em>

               swap(A[i-1], A[i])

               swapped := true

           end if ⇒

       end for

   until not swapped

end procedure

\\

Explanation:

This is pseudocode

3 0
3 years ago
Read 2 more answers
Other questions:
  • Respond to the following in a paragraph of no less than 125 words. What is the purpose of netiquette guidelines?
    10·1 answer
  • Don is the superintendent of the county school system. What task might Don
    8·1 answer
  • Impact of computer on education
    6·2 answers
  • Forensic computer investigators must _____.
    6·2 answers
  • How is a cell named in microsoft excel 2016
    10·1 answer
  • What is the internet ?
    11·2 answers
  • Write a program that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer values t
    5·1 answer
  • How do I add decimals in python?
    6·1 answer
  • I get such an error when I turn on the computer, how can I fix it?
    7·1 answer
  • Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a p
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!