1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxandr [17]
3 years ago
11

Can somebody help me?

Computers and Technology
1 answer:
vlabodo [156]3 years ago
3 0
I believe the answer is B. Optimization because it means to make work more efficient but I might be wrong. Checking definitions, this one seems more logical. 
You might be interested in
I need major help. Word processing
Pie

Answer:

I do Word processing in computing, but I use a computing textbook for studies.

I also don't have any idea about the flashcards.

I'm sorry.

Explanation:

But if you want me to help, I may.

3 0
2 years ago
6. Find the volume of the figure. Round your answers to the nearest
myrzilka [38]

Answer:

V=314.15\ ft^3

Explanation:

The attached figure shows the cone.

Radius of cone, r = 5 ft

Height of the cone, h = 12 ft

We need to find the volume of the figure. The volume of a cone is given by :

V=\dfrac{1}{3}\pi r^2 h\\\\V=\dfrac{1}{3}\pi \times 5^2 \times 12\\\\V=314.15\ ft^3

So, the volume of the figure is 314.15\ ft^3.

5 0
2 years ago
Write a sed command that will display all lines of the birthday file that do not contain the string March. What was the sed comm
Dmitriy789 [7]

Answer:

sed '/march/{d;}' birthdays.txt > result .txt

Explanation:

sed syntax is basically:

<em>sed '/expression/{command;command;...;}' inputfile > outputfile</em>

  • First, for the expression part, we use /march/ to match all lines containing that string.
  • Then for the command part, we only use {d} command to delete every matching line found.
  • The third part contains the input file to process, I have named it birthdays.txt, but it could have been any other file needed.
  • Finally "> result .txt" makes the script output to be saved into a file named result.txt
6 0
2 years ago
What are the five generations of computers?​
inysia [295]

Answer:

First Generation, Second Generation, Third Generation, Fourth Generation, Fifth Generation

Explanation:

First Generation- Vacuum Tubes

Second Generation- Transistors

Third Generation- Integrated Circuits

Fourth Generation- Microprocessors

Fifth Generation- Artificial Intelligence

4 0
3 years ago
You are attending to a neighbor who is unresponsive, not breathing normally, and pulseless. Your spouse has left to activate EMS
Novosadov [1.4K]

Answer:

inspect the CPR mask and make sure that the one-way valve is correctly in place.

Explanation:

Based on the information provided within the question it seems that the next logical step would be to inspect the CPR mask and make sure that the one-way valve is correctly in place. This valve allows oxygen to be pushed into the victim's lungs but does not pull the oxygen back through the valves, that is part of the chest compression's that the person performing the CPR needs to do.

3 0
2 years ago
Other questions:
  • 1. Create a view named customer_addresses that shows the shipping and billing addresses for each customer.
    15·1 answer
  • Which presentation software element can you use to create a model diagram with two concentric circles inside a triangle?
    10·2 answers
  • In the file MajorSalary, data have been collected from 111 College of Business graduates on their monthly starting salaries. The
    15·1 answer
  • Select the correct answer.
    12·2 answers
  • Which scenario depicts an ethical workplace practice by a business owner? A. sharing personal information of its employees with
    8·2 answers
  • Cuales son las paginas web​
    12·1 answer
  • The post-closing trial balance shows the balances of only the ____ accounts at the end of the period.
    12·1 answer
  • What are some innovations that television has undergone since its original invention ?
    11·1 answer
  • To speed up data retrieval, more vehicles will be upgraded to cellular connections and be able to transmit data to the ETL proce
    9·1 answer
  • What type of an attack is being executed if an attacker substituted an invalid mac address for the network gateway so no users c
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!