1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
3 years ago
8

Smart art can be used to create _____that highlights relationships betweeen two items

Computers and Technology
2 answers:
Natalka [10]3 years ago
8 0
B. Graphic Organizers

Hope this helps :)
mihalych1998 [28]3 years ago
6 0
B. Graphic Orginzers
You might be interested in
Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the la
Stolb23 [73]

Answer:

You are allowed to take out the old ram to replaice it, so replaice it with 2 new 4 GB of ram you dont need to unless the laptop has already 4 GB of ram the type of ram you will use is DDR3 most newer pc's have DDR4 since laptopes are smaller you would need older ram

Explanation:

8 0
3 years ago
Read 2 more answers
What feature of ntfs allows a file or folder to point to another file or folder located somewhere else in the file system?
Tatiana [17]
The click feature>........................................
7 0
2 years ago
What is meant by Program Memory is paged?
atroni [7]

Answer:

Program memory is paged, this statement is defined as in a computer system paged memory is the process of allocation of memory and storing a portion of a process of execution. Page is a unit of logical memory in a program. It follows the process of paging, as it is a method of writing an information and reading the output from the storage drive. The main advantage of this process is that it become easy to swap because everything is the same size.

7 0
3 years ago
What process identifies and grants access to a user who is trying to access a system? A. Credibility
xeze [42]

Answer:

Option C is the correct answer for the above question

Explanation:

Authentication is used to grant a person to use the system so that no other person can hack the data of the system. It is done by some unique id which is provided to the user of that system. When any person wants to use the system he needs to use that a unique id and sometimes password and some other information to use the system.

The above question asked about the process through which the user of the system grants access to use the system only. So the process is Authentication. hence Option C is correct because it states about the process Authentication while the other is not because--

  • Option a states Credibility which is not the process to enter the system.
  • Option b states Authorization which is used if the system gives access to the user, not the user can take on its own.
  • Option d states Honesty which is not the process to enter the system.
8 0
3 years ago
What are the considerations that go into representing information digitally? What are the trade-offs? What’s easy? What’s hard?
sineoko [7]
Hello!

The considerations that go into representing data digitally is that the data can be easily sent and interprated to people all over the world. However, one of the trade-offs of representing data digitally is that the information loses a "human" aspect. Instead of experimenting the data, you are simply reading it.

I hope you found this helpful! :)
3 0
3 years ago
Other questions:
  • To print a range of cells in the active worksheet, click ____ in the settings area in the print gallery.
    14·1 answer
  • How does the binary numbering system differ from the hexadecimal numbering system?
    14·2 answers
  • Which diagram is used as a popular technique for investigating causes and effects? 1. Cause and effect 2. Fishbone/lshikawa 3. R
    13·1 answer
  • 1. In your own words, describe the purpose of a for a loop.
    11·1 answer
  • A prime number is an integer that is divisible only by 1 and by itself. Write a program that: 1. Takes a number as an input. 2.
    5·1 answer
  • You need to extract data from the system your predecessor created. you discover tables have been created according to the third
    7·1 answer
  • What is E-Commerce? Answer The Following. Pls Help Me​
    5·1 answer
  • Which file format would be appropriate for web graphics​
    6·1 answer
  • The 0-1 knapsack problem is the following. A thief robbing a store finds n items. The ith item is worth vi dollars and weighs wi
    14·1 answer
  • Why is quantum computing potentially a better fit for weather forecasting than classical computers?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!