1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lutik1710 [3]
4 years ago
6

A portable document format (PDF) requires Adobe Acrobat Reader True False

Computers and Technology
2 answers:
andrew-mc [135]4 years ago
7 0

Answer:

It's true

Explanation:

because it's not false, LOL

MA_775_DIABLO [31]4 years ago
3 0
I'm pretty sure its true not 100% thoe
You might be interested in
What is a Windows feature that allows you to temporarily store text?
nata0808 [166]
This would be copy and paste.

When you select a text, you can use your keys CTRL and C to copy that same selected text. After this, you can use the paste feature by selecting CTRL and V. Doing this, your selected text will be copied and pasted to a certain location. 
3 0
3 years ago
Which of the following are some popular debugging techniques?
topjm [15]

Answer:

a fix any syntax bugs. I looked it up on the internet so you should be good good luck on your test

8 0
3 years ago
Engineers involved in product design and manufacturing use computer-aided design/computer-aided manufacturing (CAD/CAM) systems,
stepan [7]

Engineers who are involved in product design and manufacture of computer-aided should have enough knowledge in circuit and auto cad electronic design.

<u>Explanation:</u>

He or she should have mother board, voltage in or out extra. Person who develops should enough knowledge on circuit design which capacitor, resistance and voltage and processor capacity.

Each design they have first simulates and tested and result should be recorded. On simulation test success design is made.

There is third party software also available for design the circuit and gives the tested results as report.

6 0
4 years ago
A ________ infrastructure is a framework that consists of programs, procedures,and security policies and employs public key cryp
Norma-Jean [14]

Answer:

The answer is "Public Key".

Explanation:

PKI stands for public key infrastructure. It is a collection of functions, protocols, equipment, code, and procedures that require to create, maintain, transmit, store and cancel encrypted certs and handle the authentication of a public key.  

  • It is used to sign documents digitally.
  • It works for propagating with Trojans and other malware.
5 0
3 years ago
What are the negative impacts of cloud computing? Answer this question using examples, in at least 6-8 full sentences.
DerKrebs [107]

Answer:

Vulnerability to attacks: Storing data in the cloud may pose serious challenges of information theft since in the cloud every data of a company is online. Security breach is something that even the best organizations have suffered from and it’s a potential risk in the cloud as well. Although advanced security measures are deployed on the cloud, still storing confidential data in the cloud can be a risky affair.

Network connectivity dependency: Cloud Computing is entirely dependent on the Internet. This direct tie-up with the Internet means that a company needs to have reliable and consistent Internet service as well as a fast connection and bandwidth to reap the benefits of Cloud Computing.

Downtime: Downtime is considered as one of the biggest potential downsides of using Cloud Computing. The cloud providers may sometimes face technical outages that can happen due to various reasons, such as loss of power, low Internet connectivity, data centers going out of service for maintenance, etc. This can lead to a temporary downtime in the cloud service.

Explanation:

3 0
3 years ago
Other questions:
  • A software company is weighing whether to release a new version of its software as scheduled. The company can go ahead and relea
    5·1 answer
  • Which type of computer network ensures high quality​
    9·1 answer
  • Show the output waveform of an AND gate with the inputs A, B,
    5·1 answer
  • The process of auditing the source code for an application to verify that the proper security controls are present, that they wo
    14·1 answer
  • Hey guys im just curious.... whats ur favorite number
    6·2 answers
  • Who first demonstrated the computer mouse ?
    11·1 answer
  • List and briefly describe the 3 types of software
    14·1 answer
  • One of the earliest computer networks was the ARPANET, developed in the early 1960s. The purpose of this network was to:
    13·2 answers
  • Marcus traded in his 10-year-old truck for a new one. Because it is the first new truck he
    9·1 answer
  • you're adding new wires in your building for some new offices. the building has a false ceiling that holds the lights and provid
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!