1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lina2011 [118]
3 years ago
5

3. What type of error is in the following sentence? "George W. Bush is the President of the United States of

Computers and Technology
1 answer:
lana66690 [7]3 years ago
8 0

<u>Answer:</u>

<em>Punctuation</em>

<u>Explanation:</u>

The sentence started with <em>the double quotes and it should be closed appropriately.</em> All the single quotes and double quotes are paired punctuation and mostly they do not come alone.

Note that there is a <em>difference between a single quote and apostrophe</em> though same key is used from the keyboard for both. <em>The correct answer is  Punctuation.</em>

George W. Bush is the President of the United States of America”. There is one another error in the statement. At present Bush is not the President so the sentence can be <em>George W. Bush was the President of the United States of America.</em>

You might be interested in
Send a document as a PDF when A. you want the recipient to make changes to the file. B. it needs to be printed. C. it contains m
Julli [10]
A PDF must be put into an external program after being exported to be edited, you can't make direct changes to it. This eliminates answer choice A.

You can print documents with other extensions besides .pdf, such as those of Word documents and such, it doesn't have to be a .pdf. This eliminates answer choice B.

Since you can't directly edit a PDF, C is a possible answer.

Files don't have to be saved as a .pdf, especially just for the first time. Whenever you save a file, first time or not, you can save it as anything, and there's no reason to have to save it as a .pdf. This eliminates answer choice D.

So the answer is C. it contains material you don't want changed.

Hope this helps!
3 0
3 years ago
What is internet?<br>what is online?​
slavikrds [6]

Answer:

internet: The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.

online: controlled by or connected to a computer., while connected to a computer or under computer control.

3 0
3 years ago
A client is looking to maximize value from its Cloud investments by baselining, profiling, and prioritizing its human capital ne
barxatty [35]

myNav is to be present inn the Accenture software. It aim is to helps companies manage the human, technology and business dimensions of cloud change. The myNav module that will help this client is Cloud Advisor.

Cloud Advisor is simply known to be one of the many modules within the myNav platform. It was set up to handle the difficulties of cloud for digital transformation.

These Advisors are  known worldwide community of technical resources. They have a thorough  knowledge of cloud technologies and practices.

Their mission is to know the trends, regulatory implications, and our clients' needs so as to help them to set goals and create plans to achieve their desired outcome.

Learn more from

brainly.com/question/24918185

3 0
3 years ago
Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understandin
Mars2501 [29]

Since Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard, the attacks that is related to encrypted wireless packets is option A: IV attacks.

<h3>Describe an IV attack.</h3>

A wireless network attack is called an initialization vector (IV) attack. During transmission, it alters the IV of an encrypted wireless packet. One packet's plaintext can be utilized by an attacker to calculate the RC4 key stream produced by the IV employed.

Note that A binary vector used to initialize the encryption process for a plaintext block sequence in order to boost security by adding more cryptographic variance and to synchronize cryptographic hardware. The initialization vector is not required to be kept secret.

Learn more about Wi-Fi Protected Access  from

brainly.com/question/13068630
#SPJ1

See full question below

Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understanding that WPA uses a combination of an RC4 stream cipher and Temporal Key Integrity Protocol (TKIP), this makes a wireless access point NOT vulnerable to which of the following attacks when related to encrypted wireless packets?

IV attacks

Malware

Ransoware

5 0
1 year ago
How many bytes are in 1 kilobyte of storage
topjm [15]

Answer:

1000

Explanation I SEARCHED IT Up

5 0
4 years ago
Other questions:
  • Does Logarithms and Algorithms same things?
    6·1 answer
  • In order to plan George’s birthday, his father gave him a list of people who attended his birthday for the last five years. What
    8·2 answers
  • Elvis has asked Bonnie out on a date to a baseball game. Elvis is a friend of Bonnie's classmate Ginger and she has met him a fe
    5·2 answers
  • Give some examples of CyberCrime
    9·1 answer
  • Which of the following is used by credit card companies to determine APR?
    10·2 answers
  • Name the contributions of Steve Jobs and Bill Gates, with respect to technology.
    5·1 answer
  • Can I change my username?
    6·1 answer
  • I'd: 9872093250, password: qqqqq, join the meeting​
    11·1 answer
  • Please Help!
    13·1 answer
  • You need to install Windows on a new computer. You also need to replace a motherboard in another computer, and both tasks need t
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!