1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arsen [322]
3 years ago
5

Write an original idiom that uses the word dog or dogs im in 4th

Computers and Technology
2 answers:
frozen [14]3 years ago
7 0
That dog won't hunt meaning that will not work
atroni [7]3 years ago
5 0
"My dogs are barking" meaning my feet are wet.
You might be interested in
The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a select
Aleksandr [31]

Answer:

answer b

is correct

3 0
3 years ago
Choose the term that describes each step of the cycle.
stich3 [128]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about to tell the best and suitable terms for the given descriptions in the question.

As we know that a computer program is based on sets of instructions. The CPU carries out the processing using the fetch decode and execute cycle.

It is responsible for implementing a sequence of instructions called a computer program that takes input, processes them, and outputs the result based on processing.

A CPU mainly has three components such as control unit, Arithmetic logic unit,  and register.

The control unit controls all parts of the computer system. It manages the four basic operations of the Fetch Execute Cycle such as Fetch, Decode, Executes, and Storage.

So the correct terms of this question are:

Fetch: Gets next instruction

Decode: interprets the instruction

Execute: Carries out instruction.

Store: Save results of instruction.

5 0
2 years ago
Arturo is a security professional. He is strengthening the security of an information system. His design ensures that if a field
Cloud [144]

Arturo is attempting to protect the database (data) of an information system (IS).

<h3>What is an information system?</h3>

An information system (IS) can be defined as a set of computer systems, that is typically used to collect, store, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products.

In Cybersecurity, there are two (2) main techniques that can be used to check data when inputted in an information system (IS) and these include:

  • Verification
  • Validation

Data validation is a type of check which is primarily performed by a software program (application) to make sure that the data which is entered into an information system (IS) is allowable and sensible.

This ultimately implies that, any data that is not allowed or sensible are rejected and discarded by the computer system.

In conclusion, we can deduce that Arturo is attempting to protect the database (data) of an information system (IS).

Read more on data here: brainly.com/question/25885448

3 0
2 years ago
Museum web sites are generally good resources for information.<br> A.) True<br> B.) False
Hatshy [7]
True. Museums usually specialize in one area in specifics.

Ex. WWII Museums give great historical info on WWII
8 0
3 years ago
Read 2 more answers
How do you use VMware Fusion to make a Tip Calculator?
lana66690 [7]
You have to subtract the tax amount by the final amount then multiply the result by the percentage of tip that is based on the service that you received.
4 0
3 years ago
Other questions:
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • You have just finished writing a lengthy research paper and you are ready for formatting. You insert your paragraph headings and
    15·1 answer
  • In rolling a die four times, what is the odds that at least one 5 would appear?
    6·1 answer
  • 2.3.4 CodeHS HTML Word Definitions
    10·1 answer
  • What is a header row?
    8·1 answer
  • Jak sie pisze oł na klawiaturze komputerowej
    11·1 answer
  • What Microsoft feature enables you to represent text as colorful visuals
    12·1 answer
  • Coffee shops worldwide throw away billions of paper cups each year. Discuss
    9·1 answer
  • Moving images of real event​
    12·2 answers
  • Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an examp
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!