1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MatroZZZ [7]
3 years ago
7

Which of the following is a good choice to help you stay organized when you are away from the office? A. Personal Information ma

nager (PIM) B. Smart phone C. Uniform Resource Locator D. Mac OS
Computers and Technology
1 answer:
Free_Kalibri [48]3 years ago
6 0

Answer:

A

Explanation:

You might be interested in
Why is it necessary to save a document?
belka [17]
Especially if it's important if you click out of the document by accident without saving it you will lose it and never be able to retrieve it again. So it is necessary to save it so that you'll always be able to have it and find it.
8 0
3 years ago
LargeCo is planning a new promotion in Alabama (AL) and wants to know about the largest purchases made by customers in that stat
pychu [463]

Answer:

Check the explanation

Explanation:

Assuming Cust_code is unique for every customer.

Query :

SELECT * FROM CUSTOMER WHERE CUST_STATE= "AL" GROUP BY CUST_CODE HAVING LARGEST INVOICE = MAX(LARGEST INVOICE) OR (LARGEST INVOICE =0 and INV_DATE IS NULL);

5 0
4 years ago
A mobile phone user in your company is experiencing dropped phone calls. While interviewing the user, you determine the problem
zysi [14]

Answer:

The answer is "Option B".

Explanation:

A drop in call occurs when your device becomes somehow disconnected from both the network. It generally happens due to weak cell signal and where you are allowing the contact to drop. The malware dispatches a text or call, it also removes the system notifications from both the computer and extracts all text or call from system logs. All incoming calls from such numbers will be ignored and shut down, wrong choices can be described as follows:

  • In option A, It is not correct because except for one phone all the phone is working properly.  
  • Option C and Option D both are wrong because the Wi-Fi network a not provide any incoming calls.

8 0
4 years ago
Implement Shift cipher using Python or Java. The user should be prompted to provide a number between 0-25 and pick encryption (e
sveticcg [70]

Answer:

See below

Explanation:

This question is usually in response to having just learned arrays and string/character processing.  Also, encrypted text is all caps, decrypted text is all lowercase.  Convert the string accordingly with the uppercase/lowercase functions for your particular language.

Then, follow the following algorithm:

Loop through each character of the string.  Add (or subtract if decrypting) the character.  If it goes beyond the last letter of the alphabet, then subtract the shift from 26 (which is the number of letters in the alphabet.  Add the character to a new string, and return it.

5 0
3 years ago
How might your use of computers and knowledge of technology systems affect your personal and professional success?
RUDIKE [14]
It can help you more be aware of whats going on and what you need to do.
8 0
3 years ago
Other questions:
  • A rich text format (RTF) provides an electronic image of a document and can be viewed, printed, and electronically transmitted.
    7·1 answer
  • Summarize the five stages of cultural shock
    11·2 answers
  • In your memo, give three new employees directions for starting the computer and opening a word-processing document.
    9·1 answer
  • Last semester, Henri bought his textbooks over the Internet and saved a considerable amount of money. Classes start in a few day
    12·2 answers
  • Which functions are available in a Word table? Check all that apply.
    8·1 answer
  • A foreach statement can be used in place of the for statement whenever code looping through an array requires "access" to the co
    10·1 answer
  • Write a shell (text-based) program, called first_word.py, that opens the file stuff.txt and prints out the first word of every l
    14·1 answer
  • D. DROP
    6·1 answer
  • What size segment will be allocated for a 39 KB request on a system using the Buddy system for kernel memory allocation?A) 42 KB
    11·1 answer
  • We want to use image processing to detect cats in images, how do you do it? Please write down the steps.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!