1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
15

A. True

Computers and Technology
1 answer:
Ksivusya [100]3 years ago
7 0
True 
You can only do it ascending because you will get confused 
You might be interested in
Problem 1. MST - Prim's and Kruskal's algorithms
Juli2301 [7.4K]
Or maybe not Encryption converts the data in a database to a format that is indecipherable to unauthorized users who attempt to bypass the DBMS.

a. True
b. False
7 0
3 years ago
Wat is the difference between primary storage, secondary storage, and off-line storage
Hitman42 [59]
Primary storage would be downloads and whatever goes directly to your Dropbox or something like that. Secondary storage would also be downloads, but it would be the things that go to your hard drive, and lastly, off-line storage is storage on things like Flash Drives or CD-ROMs.
6 0
3 years ago
Which protocol is considered to be a dominant protocol for local area networking?
SVETLANKA909090 [29]
ETHERNETis considered to be a dominant protocol for local area networking. 
Protocol refers to the formal guidelines and policies which are used to define communication between two or more devices over an internet network. Protocols govern the end to end processes of communication over the internet.
8 0
3 years ago
A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/I
Ymorist [56]

Answer: Transport layer

Explanation: The Transmission Control Protocol / Internet Protocol both combine to aid aod transmission of data through the internet. While the Transmission control protocol handles the establishment and Maintainace of network connection through applications , the Internet Protocol handles how the established data is being sent. The Transmission Control Protocol is forms a part of the transport layer which aids in the data transmission m ensuring that data is sent to the correct source. The transport layer is able to avoid errors as it ensures that established c is nnectio is maintained until data exchange is complete.

8 0
3 years ago
Which is used to create a vector image? <br><br> Resolution <br> Pixels <br> Raster data <br> Paths
spayn [35]

Answer:

Paths

Explanation:

Vector graphics are comprised of paths, which are defined by a start and end point, along with other points, curves, and angles along the way. A path can be a line, a square, a triangle, or a curvy shape. These paths can be used to create simple drawings or complex diagrams.

6 0
3 years ago
Other questions:
  • On the CallCenterReport worksheet, add formulas that will summarize the issues for the department entered in cell B3. In cell B6
    13·1 answer
  • The computer mouse is used to
    7·1 answer
  • The U.S. economy is a free enterprise system.<br><br> True<br> False<br><br> PLEASE DONT GUESS
    8·2 answers
  • Someone say crackhead
    15·2 answers
  • Which person would be the best fit for a career in the Information Technology field?
    6·2 answers
  • In MS Word we can merga cells true or false​
    13·2 answers
  • You learn Structured System Analysis and Design as a course in your department.List down some of the contribution of this course
    9·1 answer
  • What do you think entertainment or gaming platforms will look like in the future?
    9·1 answer
  • How many passes will it take to find 30 using a binary search?
    6·1 answer
  • eocs can be fixed locations, temporary facilities, or virtual structures with staff participating remotely.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!