1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
2 years ago
15

Tina is making a resume for the first time. What should her heading section include?

Computers and Technology
1 answer:
erma4kov [3.2K]2 years ago
4 0

Name and contact information

You might be interested in
What are your undertale + au ships?
fenix001 [56]
What is an undertale? Lol
3 0
3 years ago
Fred opens a web browser and connects to the www.certskills.com website. Which of the following are typically true about what ha
Masja [62]

Answer:

c. Messages flowing to the client typically use a source TCP port number of 80.

d. Messages flowing to the server typically use TCP.

Explanation:

When fred open the web browser and start a connection to the www.certskills.com website.Two things happens from the mentioned things

1.Messages that are going to the server are use TCP(Transmission Control Protocol).

2.Message goes to the client uses port number 80 that is of TCP used for transferring web pages.

Because the port number 80 is reserved for the HTTP used for transferring web pages that uses TCP protocol.

4 0
3 years ago
Taken together, the physical and data link layers are called the ____________________. Internet layer Hardware layer Internetwor
IrinaK [193]

Answer:

Hardware layer

Explanation:

The hardware layer's job is to maintain and put to action central processor units and memory. Hardware layer first check the availability of the for mentioned duo and then decides the need to put one or another into action. Physical and data link layers act the same in the hardware layer. They bot are waiting to be called in action

6 0
3 years ago
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to pr
Colt1911 [192]
I believe the answer is B. False.

Hope this helps! ^^
7 0
2 years ago
Read 2 more answers
Give five functions of Windows​
Nata [24]

Answer:

Explanation:

It knows how to remember data and where to find that data. In other words, it knows how the raw memory works. (RAM).

It understands how to make a program run within the confines of its logical steps in an order that makes the program work the way the user intends.

It can be made to display short cuts, or any icon or picture (not an obvious talent).

It can search for unwanted intruders like ads or viruses.

It can can time events even to the point of getting your coffee ready for you with the proper add on.

6 0
3 years ago
Other questions:
  • You are going to be installing a videoconferencing system. One of the requirements of the system is that only workstations that
    10·1 answer
  • The Fibonacci numbers are the numbers
    15·1 answer
  • Technology can cause a drop in input costs.<br> a. True<br> b. False
    6·2 answers
  • The user enters a URL into a web browser, the web browser sends the information to the DNS server to look up the IP address, the
    12·1 answer
  • What is processing requirement in computer?
    11·1 answer
  • A carver begins work on the following block of granite that weighs 2700 g. What is the density of the granite?
    13·1 answer
  • Which properties would be useful to know to search for a Word document? Check all that apply.
    7·1 answer
  • Besides a backup technician, who else would have encrypted backup passwords?
    7·1 answer
  • Fill in the blank: _____ data are statistical and numerical facts about a project.
    15·2 answers
  • Henry wants to create a presentation for his clients. He wants to upload the presentation file directly to the Internet. Which p
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!