1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gayaneshka [121]
3 years ago
15

Which of these is not a modifier? short unsigned nest long

Computers and Technology
1 answer:
laila [671]3 years ago
4 0
A modifier is another example of a noun so in that case the answer would be “nest” nest could be used for a verb when someone nests can mean many possibilities so that would be the only opening spot for it.


Hope this helps!!
You might be interested in
If 2 bits of a byte are in error when the byte is read from ECC memory, can ECC detect the error? Can it fix the error?
Misha Larkins [42]

Answer:

Explanation:

Error-correcting code memory (ECC memory) these kinds of memories can detect and correct errors but only in single bit of the byte, in this case, if there is more than one bit, for example, two bits, the ECC memory can detect the error but cannot fix it, there are some memories without ECC can detect errors but not correct it.

4 0
3 years ago
research the risk of social media and list 3 websites that have information about the topic instead of the one you listed on you
Naily [24]
1) Social Life decreased
2) Missing opportunity’s
3)Passing Time
3 0
2 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
rodikova [14]

Answer:

The answer is "Option A".

Explanation:

A comprehensive collection of principles, guidelines, proposals, and studies on information and information systems privacy and safety are produced and carried out in the NIST publications.

  • The FIPS management standards for federal information and security laws contain various technical reporting sequences.
  • This process takes place after a plan is identified, reviews are carried out and risk analysis is performed.
8 0
4 years ago
Can someone help please?
aivan3 [116]
If it’s an iPhone, You’ll need a computer and iTunes installed in order to take off the disabled lock. Once it’s in recover you mode, you should get a prompt on screen to “restore” the device. However, most androids have hard resetting built into the firmware, just look up the button inputs to activate the mode for your specific model of device . hope this helped thanks
3 0
2 years ago
Read 2 more answers
Network a0 is a process by which several protocols evolve to form a single product.
mafiozo [28]

Answer:

Convergent network

Explanation:

In networking, computers devices are connected together to communicate and share resources. Devices like routers and switches are examples of intermediate network devices and computers, smartphones, tablets and IP phones are all examples of end devices in a network.

In the past, dedicated networks are installed for separate voice, text and video packets. But as information technology evolves, one network is used for all three packets. This network is called convergent network.

6 0
3 years ago
Other questions:
  • The bit width of the LRU counter for a 32 KB 16-way set associative cache with 32 Byte line size is
    13·1 answer
  • When considering server consolidation, plan on running ___________ vCPUs per core.a. 1 to 2b. 3 to 4c. 4 to 6d. 6 to 8
    7·1 answer
  • What is the benefit to having the user interface integrated into the operating system? a) Power users prefer the added flexibili
    13·1 answer
  • A MAC Frame format has a Preamble of 7 octet pattern in the form of alternating 1s and 0s used by a receiver to establish synchr
    9·1 answer
  • Study the sentences below. A.Changing the properties of characters in a sentence or paragraph in a Word document helps increase
    5·2 answers
  • How can you resize the program window?​
    5·2 answers
  • 8. Cloud Storage is
    5·2 answers
  • 9. What will help you determine the kinds of tools, equipment and utensil you will assemble, sanitize, inspect or check?
    13·1 answer
  • JQuery uses CSS selectors to select elements?
    5·1 answer
  • Please help!!!!!!! 50 POINTS!!!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!