1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
2 years ago
14

[80 points] Fill in the missing word.

Computers and Technology
1 answer:
AVprozaik [17]2 years ago
8 0

Answer:

except

you can use github copilot for this  question

You might be interested in
En cual programa puedo hacer un mapa mental
mojhsa [17]
Hay aplicaciones especializadas para la creación de mapas mentales . Pero la herramienta más simple podría ser un papel y algunas plumas . El segundo sencillo cuando no tiene instalado el software podría ser la creación de un mapa mental en MS Word
3 0
3 years ago
Name 3 coding languages
Pavlova-9 [17]

Answer:

javascript, python, c#

Explanation:

7 0
3 years ago
Read 2 more answers
Devin has noticed that his computer now takes much longer to start up than it used to and runs almost every program a bit slower
Goshia [24]
The answer is D) Too many programs running at start up

By default, a computer runs several apps as soon as it boots.However, running too many programs on startup can slow down your computer. These programs will continue running in the background of your computer and will result to the computer running slowly. 

You can use the task manager to stop currently running applications or completely disable programs which are automatically launched upon boot up.






7 0
4 years ago
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
A server core installation can't be converted to a minimal server interface.
11Alexandr11 [23.1K]
True.... ca i have brainliest?
3 0
3 years ago
Other questions:
  • List three reasons you might use hwinfo when troubleshooting and upgrading a computer
    10·1 answer
  • Given a string, return a version without the first and last char, so "Hello" yields "ell". The string length will be at least 2.
    13·1 answer
  • What is the color of red?
    9·2 answers
  • Bruh my sister does bot understand what this means
    6·1 answer
  • The processor has a five-stage pipeline F D O E M S; that is, instruction fetch, instruction decode, operand fetch, execute, mem
    13·1 answer
  • Does anybody play nitro type
    7·2 answers
  • After you configure backup settings using the backup plugin, backup jobs will run automatically and start taking backups at the
    13·1 answer
  • Which of the following is NOT an example of application software?
    8·1 answer
  • When was there a time that you feel you may have “failed” at something?
    13·2 answers
  • Which career qualification is unique to the Energy Transmission career pathway and not to the Energy Distribution pathway? color
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!