1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
3 years ago
12

How many bytes make up a megabyte? One hundred One thousand One million One billion

Computers and Technology
1 answer:
Phoenix [80]3 years ago
4 0
One million is the answer.
You might be interested in
A communication pattern in which the parties slowly reduce their dependence on one another, withdraw, and become less invested i
zepelin [54]

Answer:

The correct answer to the following question is option A. an avoidance spiral.

Explanation:

An avoidance spiral is a spiral in which parties avoid the conflicts at all cost in which leads to reducing the influence, dependence, etc. This spiral can also be destructive.

In other words, it is the only spiral in parties slowly reduces their dependence and the influence on the one and another.

7 0
3 years ago
What is a computer system?
klio [65]
A system of interconnected computers that share a central storage system and various peripheral devices such as a printers, scanners, or routers. Each computer connected to the system can operate independently, but has the ability to communicate with other external devices and computers

<span>Read more: http://www.businessdictionary.com/definition/computer-system.html</span>
4 0
3 years ago
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
Amanda needs to create an informative print brochure for her local library’s fundraiser dinner. What critical detail must she ha
Charra [1.4K]

Answer: A. target audience for the brochure.

Before even starting the design of the brochure, Amanda needs to get information on who the target audience are going to be. Amanda will need to conduct a quick research on what the audience of their community likes and does not like. By understanding the target audience, Amanda will be able to get an idea of what design, colors, and format she would make that will attract the attention of their audience.

5 0
3 years ago
Given an int variable k that has already been declared, write some code that uses a for loop to print a single line consisting o
yawa3891 [41]

Answer:

The program to the given statement can be defined as follows:

Program:

//header file

#include <stdio.h> //defining header file

int main() //defining main method

{

int k; //defining integer variable k

for (k=1;k<=97;k++) //defining for loop

{

printf("*"); //print value asterisks

}

return 0;

}

Output:

*************************************************************************************************

Explanation:

Firstly, the headers file is included in the above C-language, and then the main method is described and all computations are performed with this method, which can be described as follows:

  • Inside the main method, an integer variable k is declared.
  • In the next line, the for loop is declared, which uses the variable k, which starts from 1 and ends when the value of k is less than equal to 97, inside the loop, it will print asterisks.
6 0
3 years ago
Other questions:
  • The Earth's _______ is ductile overall, tending to flow very slowly and deform in a _______ manner.
    14·2 answers
  • : Each individual data items of record is called a
    7·1 answer
  • What are the features of Cobol language that make it suitable for programming business applications.
    6·1 answer
  • _____ involves storing data and running applications outside the company’s firewall. answer grid computing parallel computing cl
    11·1 answer
  • Select the correct answer.
    7·1 answer
  • Please choose the correct option please tell fast​
    9·1 answer
  • How do computer users benefit from the increased speed?
    9·1 answer
  • February 1995, Kevin Mitnick was arrested. While on parole was he allowed to have a phone or computer?
    6·2 answers
  • Question #2: How would you demonstrate professionalism in a video call with a teacher? Edmentum Digital world Please Help!!
    8·1 answer
  • What does Technology mean to you?​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!