1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mekhanik [1.2K]
3 years ago
5

What is a taskbar?

Computers and Technology
1 answer:
shutvik [7]3 years ago
4 0
To me, the answer would be A menu that list options available in a particular program.
Because, It a list of instructions you can make your computer do like copy, paste, and print.
You might be interested in
Chunking is a good strategy for completing large assignments because it makes the work
Bess [88]

Answer:

ExChunking is a good strategy for completing large assignments because it makes the work

less boring.

more thorough.

less difficult.

more manageable.planation:

Explanation: less difficult (C)

8 0
3 years ago
Read 2 more answers
Once Raul selects a technology solution, he has completed the process. <br> a. True<br> b. False
romanna [79]
The answer is true because choosing a technology solution is the last step
7 0
3 years ago
Read 2 more answers
What was the history of technology since the 1980s to now and how is it used in classrooms?.?. PLEASE HELP
levacccp [35]

Answer:

Please check the explanation.

Explanation:

The US education department mentioned that in 1900 there were only 10% of students enrolled in the schools, however by the end of 1992, the percentage increased by 85% and it became 95%. In 1930 1 million students were enrolled in university. And by 2012, it became 21.6 million. The teachers began to follow a new type of teaching, and the academics began to follow a special method for communique, education as well as for helping the students understand the concepts.

Though, after the 1980s the personal computer came into being in schools and colleges. Since then numerous versions of PC have originated in the marketplace as well as mobiles tracked by Smartphones, and now nearly 100% of people in the US have smartphones. Virtual reality, augmented reality, AI, Machine learning. etc. has cemented the way for the virtual classrooms. Also, each subject is now up with fruits and not just-food. The consequence is such a delightful setup of the Virtual schoolrooms in the entire US, and all over the ecosphere. The projectors, VR devices, AI applications for education, online classroom facility, Electronic version of chalkboards, and in fact everything is no sophisticated, and it is making not only teaching easy but learning as well. And the result is, students are ending up with better results, and teachers seem to be happier and more relaxed. And that is making school management satisfied as well.

3 0
4 years ago
List the three control problems associated with competingprocesses and briefly define each.
hjlf

Answer and explanation :

the three control problems associated with competing process are

  • MUTUAL EXCLUSION : We know that some resources are shareable and some are not shareable. which means only one process can access the resource at a time this type of resources are called critical resources this code can be access at only one process at a time. the other process if required to access should not be allowed
  • DEADLOCK: this hold the process without complete for example suppose there are two resources R1 and R2 and two process P1 and P2 and P1 use R1 and P2 use R2 but after some time when P1 needs R2 but R2 is not available as it is used by P2 so the all process will be on hold
  • STARVATION : when priorities are given to the process as high priorities and low priorities. And high priorities process always competing  then low priorities process have to wait for very long time this is called starvation
3 0
3 years ago
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
uysha [10]

Answer:

Security Tab is the correct answer.

Explanation:

The Security Tab will enable the users to authorize anyone to use that file or directory.Many clients deleted the security tab because After that nobody can alter the security privileges on the device.

  • With the help of the Security tab, we will minimize the ActiveX attacks on Internet Explorer. This option is available in the Internet Options of the dialog box.
  • Other options are incorrect because they are not related to a given scenario.
8 0
3 years ago
Other questions:
  • The ______ identifies the path for the currently open folder
    8·2 answers
  • Advancement in technology is making peripherals...
    5·2 answers
  • How can touch typing quickly but accurately improve your earnings (the money you can make)
    15·2 answers
  • Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact tha
    5·1 answer
  • Sulfur content is measured in
    11·1 answer
  • These icons cannot be removed from the Dock. Finder e-mail music player Trash
    14·1 answer
  • Which of the following statements best reflects the pros and cons of overtime potential for a line installer or repairer?
    15·1 answer
  • Which is the following should be selected in the paragraph dialogue box to prevent page break from occurring within a paragraph
    12·1 answer
  • Question: 11
    10·1 answer
  • Which of these are examples of an access control system? Check all that apply.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!