1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ziro4ka [17]
3 years ago
13

What are you guys doing?

Computers and Technology
2 answers:
slava [35]3 years ago
4 0

Answer:

Explanation:

Good and u

vovikov84 [41]3 years ago
3 0
I’m doing good what about you?
You might be interested in
Are engineers who help to develop products and projects by creating technical drawings
Alinara [238K]

Answer:

This is true but an Engineer is much more than that. They are the professionals of engineering, who do the invention, analyze, design and test complex systems, machines, structures, machines for fulfilling the functional objectives gadgets as well as the requirements while taking into consideration the limitations that come up due to practicality, safety, regulations, and cost.

Explanation:

Please check the answer section.

8 0
3 years ago
Importance of software in computer
Juli2301 [7.4K]

Answer:

Computer hardware is virtually useless without computer software. Software is the programs that are needed to accomplish the input, processing, output, storage, and control activities of information systems.

Explanation:

4 0
3 years ago
Read 2 more answers
What is a circuit breaker and how is it different from a fuse? Why do we need these two different devices?
Liula [17]

Answer:

Circuit breakers and fuses both have the same purpose, but a fuse will melt when stopping electricity where as circuit breakers can just be reset. You need both devices in order to stop a overload of power that could fry your electronics or worse, start fires.

Explanation:

7 0
3 years ago
Read 2 more answers
Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission fr
Tatiana [17]

Answer:

b) White-hat hacker

Explanation:

This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out  based on a agreement between the whihte-hat hacker and the client via a contract.  

8 0
3 years ago
CJ is developing a new website blogging about cutting-edge technologies for people with special needs. He wants to make the site
crimeas [40]

Answer:

CJ is developing a new website blogging about cutting-edge technologies for people with special needs. He wants to make the site accessible and user friendly. CJ wants to link to articles in his website. He has assigned specific values for each ID attribute. To link to that ID attribute, CJ must use an # before the ID value in his href statement.

Explanation:

In order to create an internal link, a link's href element must be assigned to a hash symbol #, including the value of the id attribute for the element that is to be to internally linked to, usually further down the page. Then, there is also a need to add the same id attribute to the element to be linked to.

An id refers to an  attribute that uniquely describes an element. Below is an example of an internal anchor link and its target element:

<a href="#contacts-header">Contacts</a>

3 0
3 years ago
Other questions:
  • What are the two elements of creating a flyer
    12·2 answers
  • Server farms such as Google and Yahoo! provide enough compute capacity for the highest request rate of the day. Imagine that mos
    12·1 answer
  • The approved detail design resulting from the __________ serves as a basis for making the decision to begin production.
    8·1 answer
  • Suppose Host A sends Host B a TCP segment encapsulated in an IP datagram. When Host B receives the datagram, how does the networ
    11·1 answer
  • The minimum spanning tree of an undirected graph G exists if and only if G is connected. True or False?
    12·1 answer
  • You can place an insertion point by clicking in the field or by pressing ____.
    13·1 answer
  • In which generation of computers are we in?​
    9·1 answer
  • Which of the following words best describes the word icon ​
    14·2 answers
  • . Why is it important to use Social Media responsibly? ANSWER NOW!!!
    15·2 answers
  • The field of ____ is concerned with the technical issues involved in information display. computer science
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!