1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
2 years ago
14

ASAP help me I dont have enough time

Computers and Technology
1 answer:
umka21 [38]2 years ago
7 0

Answer:third stage of parent-infant attachment

Explanation:

You might be interested in
The graphical user interface (GUI) was pioneered in the mid-1970s by researchers at:
olasank [31]
IBM is the correct answer
5 0
3 years ago
Read 2 more answers
Which of the following is a Microsoft solution
Sholpan [36]

Answer:

TS RemoteApp

Explanation:

The question is wrong. Correct question and choices are:

Which of the following is a Microsoft solution that runs on a Microsoft Terminal Services server but appears, to end users, as if it were actually running on their systems?

a.TS Web Access

b.DirectAccess

c.TS RemoteApp

d.Terminal Services for Applications

Terminal Services RemoteApp can be used remotely via remote desktop protocal (RDP) but look like to users as if they are running locally by successfully integrating user's desktop.

These applications are available since Windows Server 2008 and can be used on various windows operating systems.

7 0
3 years ago
How many bits are used to direct traffic to specific services running on a networked computer?
Mars2501 [29]

Answer:

The correct answer is 16 bit.

Explanation:  

The main role of the transport layer provided the communication channel of the process which are running in a different host. When the information flows there is always traffic that is arisen but the transport layer aimed is that process will go at the correct node and received at the proper destination. The 16-bit number specifies that the process or node is running in the networked traffic.

3 0
3 years ago
QUESTION 2
Len [333]

Answer:

Group of answer choices.

A. Apply numbering to the list.

B. Apply bullets to the list.

C. Apply multilevel numbering to the list.

D. Manually enter a ">" character at the beginning of each item in the list.

Answer:

B. Apply bullets to the list.

Explanation:

Formatting is a feature found in a lot of word processing software applications such as Microsoft Word, Notepad, etc., which is designed to avail end users the ability to apply specific formatting options such as cut, bold, italics, underline, list, etc., to texts based on certain criteria defined by an end user.

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

In Microsoft Word, a list can be formatted using a numbered or bulleted arrangement style. A numbered style (1, 2, 3, 4, etc) is typically used for an ordered list while a bullet is designed to be used for an unordered list.

Hence, the best way to format a document containing a list of items that appear in no particular order is to apply bullets to the list.

For example, a bulleted list of my favorite subjects arranged in no particular order would appear as this;

English language

Mathematics

Geography

Biology

Chemistry

Physics

Computer technology

8 0
3 years ago
Computer forensics is practiced _____. A. Only by specially trained government and law-enforcement personnel B. By many organiza
laiz [17]

Answer:

Option B is the correct answer.

<h3>Computer forensics is practiced by many organizations, including public- and private-sector organizations such as hospitals, law enforcement, and businesses. </h3><h3 />

Explanation:

Computer forensics can be defined as a branch of digital forensics that deals with the evidences and and proofs found on all digital storage media such as computers.

It is basically a step for enhancing security bases of communication. Therefore it is mainly used by law-enforcement personnel but it can also be practiced by other institutions for the purpose of self security.

<h3>I hope it will help you!</h3>
4 0
3 years ago
Other questions:
  • You are designing a distributed application for Azure. The application must securely integrate with on-premises servers. You nee
    13·2 answers
  • Describe the use of technology in the promotional function
    5·2 answers
  • What are 6 steps to take to figure out what's wrong with your computer?
    5·1 answer
  • Does Congress have a role in determining FAA regulations? If so, what is it?
    11·1 answer
  • What is NOT a built-in function in python?<br> sqrt()<br> string()<br> fabs()<br> O print()
    12·2 answers
  • If you were an architect planning on building a large scale Municipal complex what type of engineer would you identify as essent
    10·1 answer
  • Help a brotha out..................
    10·1 answer
  • The US government appropriates less than one million dollars in funding each year to STEM education programs. True False
    7·2 answers
  • If you need to modify a features in a part created using the Mirror tool, you can make the change in the original feature and th
    14·1 answer
  • Need this java code its on zybooks. given two integers as user inputs that represent the number of drinks to buy and the number
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!