1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
2 years ago
3

files are those the control how the computer operates and includes things like system startup scripts, program support files, an

d system log files.
Computers and Technology
1 answer:
matrenka [14]2 years ago
8 0

Answer:

Mostly true.

Explanation:

While files can control how a computer operates, they can also be the output of what they operated on, too.

You might be interested in
Which of the following is something all models use to determine relationships?
Aleks [24]

Answer:

Math

Explanation:

Which of the following is something all models use to determine relationships?

The answer would be math.

8 0
4 years ago
What does "DVI" stand for?
pishuonlain [190]
Digital Video Interface
7 0
3 years ago
Read 2 more answers
Open and close ____ immediately following the name of a procedure identify a Visual Basic statement as a procedure call statemen
Bezzdna [24]

Answer:  Parentheses

Explanation:

 The open and close parentheses basically identify the visual basic statement   in the procedure call statement.

The close procedure basically in the visual basic statement basically terminate the call of a program that performed the real processing. Open and close is also known as right and left parentheses.

The close statement is basically control the pre-defined programming statement in the particular close procedure.

 

4 0
4 years ago
Which type of application architecture has a logic tier
LuckyWell [14K]

Answer:

hi

Explanation:

7 0
3 years ago
Read 2 more answers
What is computer virus​
IRINA_888 [86]

Answer:

A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Explain how it makes you feel that you must share the road with others
    15·1 answer
  • Which one of the following analog VOM ranges would be selected to measure a DC
    13·1 answer
  • Explain how devices on a lan access resources in a small to medium-sized business network.
    15·1 answer
  • When troubleshooting firewalls, you should never attempt to repeat the problem because you could do more damage. T/F
    6·1 answer
  • Decision making at the executive or strategic level requires business intelligence and knowledge to support the uncertainty and
    12·1 answer
  • There are many advantages and some disadvantages to using social media. Explain at least one of the advantages to
    5·1 answer
  • Need help ASAP <br><br> Thankss + BRAINLIST only for correct answers
    11·1 answer
  • 1 paint 2 anahaw leaf 3 shellac 4 varnish 5 metal sheets 6 paint 7 G.I. pipe 8 enamel paint 9 bamboo 10 fillers
    14·1 answer
  • HOW DO I HACK PUBG MOBILE WITH PROOF <br>GIVE ME LINK​
    6·2 answers
  • An Accenture healthcare client is interested in implementing an Artificial Intelligence (AI) solution to improve patient care, b
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!