1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
3 years ago
8

Smart art can be used to create _____that highlights relationships betweeen two items

Computers and Technology
2 answers:
Natalka [10]3 years ago
8 0
B. Graphic Organizers

Hope this helps :)
mihalych1998 [28]3 years ago
6 0
B. Graphic Orginzers
You might be interested in
HELP ASAP DONT ANSWER WITH A LINK​
OlgaM077 [116]

Answer:

<u>Layout</u>

title

title and content

section header

comparison

<u>Orientatio</u><u>n</u>

landscape

portrait

8 0
3 years ago
to see additional functions available in an open desktop, document or website what action should the user perform?
Phoenix [80]

To see additional functions available in an open desktop, document or website, the action that the user should perform is; Right click the mouse

  • When working on either open desktop, document or website, we make use of the mouse button to carry out a couple of operations.

  • Now, the left mouse button is the main button of the mouse primarily used for selection of an item or word or object e.t.c. Whereas, when it comes to seeing more options or functions associated with the highlighted item of the mouse left button or just random additional functions without any selection, right clicking the mouse button would be the best action.

Read more on additional functions at; brainly.com/question/1092681

6 0
2 years ago
Read 2 more answers
The type of connection that is kept open after an HTTP request to the server.
Igoryamba

Answer: Persistent

Explanation:

 Persistent is the type of connection in the hyper text transfer protocol (HTTP) that act as communication channel in the network. It basically remain open after HTTP request or response to the server.

Persistent also maintain the HTTP connection and prevent it from the timing out with the help of transmission control protocol packets.

In the persistent connection, after request has been send TCP connection is leave by the server. Therefore, the request can be easily send between the similar server and client.

6 0
3 years ago
How are phishing, ransomware and distributed- denial of service attack alike and different?
Aleks04 [339]

Answer:

Phishing means cyber theft in which the cyber thief sends the target PC a malicious email, which looks like coming from some known source, and they ask for certain critical information, which must not be leaked. Similarly, In ransomware, they send the phishing email with malicious code, and they hack the computer system. They then ask for a ransom as a return for reactivating your PC. Distributed Denial of service attack happens when the traffic flood the bandwidth and the resources of a PC, and finally a lot of are denied of access to them. Ransomware, when it attacks a bank account, becomes a Denial of service attack, as multiple users are stopped from accessing their account. All of these are hence, almost the same and revolves around the phishing email.

Explanation:

Please check the answer.

8 0
3 years ago
Assume that $s0 is initialized to 11 and $s1 is initialized to 22. Suppose you executed the code below on a version of the pipel
gulaghasi [49]

The final  values of registers $s2 and $s3 be $s2 = 33 and $s3 = 6.

<h3>Given MIPS instructions:</h3>

<em>I1: addi $s0, $s1, 5 #$s0 = (22 + 5) = 27 </em>

<em>I2: sub $s2, $s0, $s1</em>

  • value of register $s0 will be updated in clock cycle-5 but this instruction read value of register $s0 in clock cycle-3.

<em>$s2 = (11 + 22) = 33</em>

<em>I3: addi $s3, $s0, -5</em>

  • value of register $s0 will be updated in clock cycle-5 but this instruction read value of register $s0 in clock cycle-4.

<em>$s3 = (11 - 5) = 6</em>

See more about MIPS at brainly.com/question/26556444

#SPJ1

3 0
2 years ago
Other questions:
  • Type dig www.example A in order to get the IP address of www.example. What’s the TTL of the A record returned in the response? W
    9·1 answer
  • 18) choose which article title would most likely be described by the database subject headings victims of famine, ireland, histo
    14·1 answer
  • _____ is the operation of setting a variable to a value.
    11·1 answer
  • Different network scenarios require the
    9·1 answer
  • Im on Edge 2021 and i did an assignment that says, "Processing." The assignment won't give me a grade and says it is overdue. wh
    10·1 answer
  • How do films use camera shots?
    10·2 answers
  • Xercise 1<br>1.<br>What is system? Explain the components of system in brief.​
    12·1 answer
  • Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to
    6·1 answer
  • All HTML5 webpages must begin with the HTML element _____.
    6·1 answer
  • Which extra step do verizon devices require for fenrir to be allowed to connect to the device?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!