1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
7

Noah's document was very plain and would not catch the readers' attention. Select each item below that would make

Computers and Technology
1 answer:
Umnica [9.8K]3 years ago
4 0

Answer:

1,2,3

Explanation:

You might be interested in
What is the binary number system? ​
Scilla [17]
DescriptionIn mathematics and digital electronics, a binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two symbols: typically "0" and "1". The base-2 numeral system is a positional notation with a radix of 2. Each digit is referred to as a bit.
6 0
3 years ago
Using reliable internet sources, identify three ways we use analog and digital signals in our everyday lives.
Montano1993 [528]
Clocks maybe is the answer. I really don’t know
7 0
3 years ago
Define ROM and list the types of read only memories.
Lorico [155]

Answer:

Read-only memory, also known as ROM, is a storage medium used in computers and electronic devices, which allows only the reading of information and not its writing, regardless of the presence or not of an energy source.

The data stored in the ROM cannot be modified, or at least not quickly or easily. It is mainly used to contain firmware (a program that is closely linked to specific hardware, and is unlikely to require frequent updates) or other vital content for device operation, such as programs that start up the computer and perform diagnostics.

There are three types of ROM memories: PROM. EPROM, and EEPROM.

6 0
3 years ago
What level of damage to national security can you reasonably expect top secret information to cause if disclosed?.
Vinvika [58]

Exceptionally grave damage is the level of damage to national security can you reasonably expect top secret information to cause if disclosed.

When it is conceivable that information's unauthorized exposure could result in exceptionally severe harm to the country's security, it may be given the "Top Secret" classification. The strictest caution should be exercised while applying this classification.

Armed hostilities against the United States or its allies, a breakdown in international relations that has a significant impact on national security, the compromise of crucial national defense plans or sophisticated cryptologic and communications intelligence systems, the disclosure of sensitive intelligence operations, or the disclosure of scientific or technological advancements that have a significant impact on national security are examples of "exceptionally grave damage."

The level of harm to national security that can be expected from the disclosure of top-secret material is exceptionally grave damage.

To know more about exceptionally grave damage click here:

brainly.com/question/2802958

#SPJ4

3 0
1 year ago
Please help!!
kolbaska11 [484]

Answer:

HTML is the standard markup language for creating and designing websites

while

HTML5 is the fifth and the latest version of HTML

with new added features,tags and element

6 0
3 years ago
Other questions:
  • Vanessa and Marie are best friends. Vanessa tells Marie that one of their classmates has been posting nasty comments about Vanes
    10·2 answers
  • Write about the future of Reliability and Security in Software Engineering.
    13·1 answer
  • "Two technicians are discussing FWD driveshaft service. Technician A says that removal of the driveshaft usually requires partia
    15·1 answer
  • ____ is a general term that includes all products of the human mind, including original ideas.
    5·1 answer
  • Using javaFX components
    6·1 answer
  • What is the best data structure to solve the following problem? a) A list needs to be built dynamically. b) Data must be easy to
    11·1 answer
  • If you forget your privacy password what will you do if the ask this question what is the name of one of your teacher?​
    12·1 answer
  • What is a network computer that processes requests from a client server​
    11·1 answer
  • If you get your foot stuck in a cloud how many colors can you smell with you ears
    8·1 answer
  • Explain the risks to privacy from collecting and storing personal data on computer systems and the programmer’s role to safeguar
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!