1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brut [27]
3 years ago
6

PLATO

Computers and Technology
2 answers:
Natasha2012 [34]3 years ago
5 0

Answer:

is it just a blank or does it have choices?

vagabundo [1.1K]3 years ago
5 0

Answer:

Keys

Explanation:

I got it right

You might be interested in
The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities an
kenny6666 [7]

Answer:

Literate

Explanation:

A computer literate is a person that is high in knowledge and skill with computers, knowing the device inside and out

5 0
4 years ago
Just answer the 2 questions. THX
pogonyaev

Answer:

A then D

Explanation:

3 0
3 years ago
. It is essential for a relay energized by alternating current to have A. many turns of small wire. B. a laminated core and a sh
Tomtit [17]
The correct answer is B, a laminated core and a shading coil.

A key difference in an AC relay is the presence of a "shading coil". The purpose of this coil is to keep the relay on when the current drops to zero during phase change (note that in AC power the current and voltage are alternating in a sine wave around 50/60 times per second). The shading coil retains some magnetic energy and essentially holds the relay ON when the current drops to zero momentarily due to the AC waveform.

AC relays also have a laminated core to prevent losses due to eddy current heating.
6 0
4 years ago
Which of the following is a best practice for a strong password policy?
belka [17]

Answer:

Passwords must meet basic complexity requirements.

Explanation:

Password should contain:

  • Uppercase letters
  • Lowercase letters
  • digits (0 through 9)
  • special characters like @#$%^&*
  • minimum length of 8

Passwords should not contain:

  • user's name or surname
  • birth year/date
  • not similar to previous password
  • account/identity number
7 0
3 years ago
A(n) ____ circular reference occurs when a formula in a cell refers to another cell or cells that include a formula that refers
weeeeeb [17]
Indirect is the correct answer. 
8 0
4 years ago
Other questions:
  • Rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. This problem
    13·1 answer
  • Jessica has pinned her favorite applications as icons on her desktop. She always clicks on these icons to work on them. Which us
    5·1 answer
  • The ____ command can be used to view the contents of a record when it is anticipated that the record will need to be modified. I
    15·1 answer
  • Can you give me a long list of anime
    6·2 answers
  • Quienes son el proyectista y el director de obra en una ICT
    6·1 answer
  • Write a SELECT statement that selects all of the columns for the catalog view that returns information about foreign keys. How m
    6·1 answer
  • Write a Java Program that can compute the mean, median, the highest, and the lowest of the students’ scores in a class. First, t
    6·1 answer
  • The ____ object can trigger a selectedindexchanged event when a selection is made
    5·1 answer
  • For each situation, provide a pseudocoded algorithm that would accomplish the task. Make sure to indent where appropriate.Situat
    10·1 answer
  • For a policy to become enforceable, it must meet five criteria, which are?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!