1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jek_recluse [69]
2 years ago
12

Please please help I don’t understand this

Computers and Technology
2 answers:
garik1379 [7]2 years ago
6 0

Answer:

It is this because yass

Explanation:

And yes

Margarita [4]2 years ago
6 0

Answer:

Yes it is this because yes

Explanation:it is this because

You might be interested in
7. Little Big Planet advanced the platforming genre of games by __________.
patriot [66]

Answer:

Explanation:

c because it will hook the person

5 0
3 years ago
The users in your organization bring their own mobile devices to the office and want to be able to access the network with them.
Afina-wow [57]

Answer:

The Windows feature that can be used to protect a network from malware threats that might be on the network user's mobile devices is;

Device Health Attestation (DHA)

Explanation:

Device Health Attestation (DHA) is a feature introduced in version 1507 of widows 10 that enables increased security of the network of enterprises to have mainly hardware which are attested and monitored using cloud based service health check or DHA service on Windows Server 2016.

Device Health Attestation carries out assessments on devices based on Windows 10 devices and Windows 10 mobile devices that work with TPM 1.2 or 2.0 and devices which are within the premises

Items checked include boot configuration and attributes such as Secure Boot, ELAM, and BitLocker

Corrective action are triggered by Mobile Device Management (MDM) based on report data from the DHA.

4 0
2 years ago
A compression scheme for long strings of bits called run-length encoding is described as follows: Rather than record each 0 and
Musya8 [376]

Answer: (B) Lossless compression

Explanation:

 According to the question, the given technique is the example of the lossless compression. The lossless compression is one of the technique that decompress the data into the original data form without any type of losses.

The lossless compression is the technique that usually compress the data, text and the databases. This technique also improve the compression rate helps in reconstruct the original data. It is used in various types of encoding methods, GNU tool and zip file.

3 0
3 years ago
The option to publish a file as a blog post is located in the____options on the File tab.
shtirl [24]
The answer is #2: Share
3 0
2 years ago
If you think a query is misspelled, which of the following should you do? Select all that apply.
Alik [6]

Answer:

The answer is: letter C, For obviously misspelled queries, base the utility rating on user intent.

Explanation:

The question above is related to the job of a "Search Quality Rater." There are several guidelines which the rater needs to consider in evaluating users' queries. One of these is the "User's Intent." T<u>his refers to the goal of the user. </u>A user will type something in the search engine because he is trying to look for something.

In the event that the user "obviously" misspelled queries, the rate should be based on his intent. It should never be based on why the query was misspelled or how it was spelled. So, no matter what the query looks like, you should assume that the user is, indeed, searching for something.

Rating the query will depend upon <u>how relevant or useful it is and whether it is off topic. </u>

4 0
3 years ago
Read 2 more answers
Other questions:
  • Your personality is that of everyone else
    15·2 answers
  • What is the purpose of a filename extension? How can you restore a file that you deleted from the hard disk?
    10·1 answer
  • #Write a function called "replace_all" that accepts three #arguments: # # - target_string, a string in which to search. # - find
    11·1 answer
  • Draw a dfd that shows how data will be stored, processed, and transformed in the tims system
    9·1 answer
  • What is the data and information with example? ​
    9·1 answer
  • Which emails go to the draft folder
    5·2 answers
  • Write a function named enterNewPassword. This function takes no parameters. It prompts the user to enter a password until the en
    6·1 answer
  • Q.No.3 b. (Marks 3)
    5·1 answer
  • Using these Web sites for guidance, write a definition in your own words for five of the terms listed below.
    8·1 answer
  • I am a new linux and unix system user. how do i find out the user and groups names and numeric ids of the current user or any us
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!