1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elanso [62]
3 years ago
15

Which of these jobs would be most appropriate for someone who majors in computer engineering? ANSWER FAST PLEASE

Computers and Technology
2 answers:
hodyreva [135]3 years ago
8 0

Answer:

D. designing a CPU for an embedded system

Explanation:

I just took the quiz and got it right.

Allushta [10]3 years ago
3 0

Answer:

D; designing a CPU for an embedded system

Explanation:

You might be interested in
you're troubleshooting an ip addressing issue, and you issue a command to view the system's tcp/ip configuration. the command yo
Leviafan [203]

Based on the above, the operating systems the person is  working on is known to be called Linux.

<h3>What is Linux used for?</h3>

Linux is known to be a kind of an open-source Unix-like operating system that is known to be focused on the Linux kernel, which is said to be a kind of an operating system kernel that was said to have been first released on September 17, 1991.

This was released by a man called by Linus Torvalds. Linux is known to be packaged as a form of Linux distribution. It is said to be used as a Server OS made for web servers, it is also used for database servers, file servers, email servers and others.

Therefore, Based on the the given description above, the operating systems the person is  working on is known to be called Linux.

Learn more about Linux from

brainly.com/question/12853667
#SPJ1

You are troubleshooting an IP addressing issue, and so issue a command to view the TCP/IP configuration of the system. The command you use produces the following output:

fxp0: flags=8843&lt;UP, BROADCAST, RUNNING, SIMPLEX, MULTICAST&gt; mtu 1500

inet6 fe80: :2a0:83ff:fe30:57a%fxp0 prefixlen 64 scopeid 0x1

inet 192.168.1.235 netmask 0xfffffx00 broadcast 255.255.255..255

ether 00:a0:83:30:05:7a

media: Ethernet autoselect (100BaseTX &lt;full-duplex&gt;)

status: active

1o0: flags=8049&lt;UP, LOOPBACK, RUNNING, MULTICAST&gt; mtu 16384

inet6 : : 1prefixlen 128

inet6 fe90: : 1%1o0 prefixlen 64 scopeid 0x7

inet 127.0.0.1 netmask 0xff000000

Which of the following operating systems are you working on?

3 0
1 year ago
2 4.1.2 Quiz: Information Systems and Business Planning
Delicious77 [7]

Answer:

Option D

Explanation:

Complete question

A management information system is typically used by _____.

A. all levels of employees

B. company executives

C. upper-level managers

D. middle-level managers

Solution

A management information system is typically used by middle-level managers

Option D is the correct answer

Management information system (MIS) helps the middle managers to control the work across the various teams of organization.

5 0
2 years ago
What is better in everybodys opinion. AMD or Intel?
Rama09 [41]

Answer:

Intel is more for work and such, while AMD is foucsed on gamers. I use AMD because I play many games, but it really depends on what you use your computer for.

Explanation:

4 0
3 years ago
Read 2 more answers
Pat is listing the parts of a computer. Which is the best option to use when formatting the list?
Zina [86]
If you mean a web page ten the bet option would be elements, where gives you an unordered list and give you an order list
5 0
3 years ago
Are sql injections legal?
natima [27]

Essentially, if you are seen to be someone who knows what you are doing, then even typing in a single-quote to a web form has been enough to be arrested and charged over in the past.

But lets say i'm writing a pen test tool that will be doing sqli testing and let it loose on sites that are 'out in the wild'. I'm not going to be doing dumps of any information. But is just the vulnerability scan itself illegal?



8 0
3 years ago
Other questions:
  • Which is an example of intrinsic motivation?
    13·2 answers
  • Explaim Why the shape of a cell is hexagonal
    15·1 answer
  • Jackson is teaching the decimal number system. He wants his students to know how to expand numbers by powers of 10. Which is the
    13·2 answers
  • When you’re in the Normal view, what are the visible panes?
    15·2 answers
  • Three variables, x, y and z, supposedly hold strings of digits, suitable for converting to integers. Write code that converts th
    7·1 answer
  • Create a file account.cpp containing a Bank Account Class.
    11·1 answer
  • High capacity circuits are limited by the least capable network link, which is typically the user connection. As such, it is imp
    11·1 answer
  • What will empty the log of Internet sites you have recently viewed
    12·2 answers
  • If there are 1 to 30 rows the program should: Calculate and display the average of all of values read into the array Calculate a
    6·1 answer
  • Without entering into the internet cloud or intranet cloud, how many icons in the topology represent endpoint devices (only one
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!