1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
3 years ago
11

What is a thesaurus is best used for​

Computers and Technology
2 answers:
Law Incorporation [45]3 years ago
6 0

Answer:

A thesaurus is used to help you become more precise (if you are working on a technical paper) and descriptive (if you are writing a creative piece) in your writing. It provides a list of suggested “replacements” for any word you have in mind. The thesaurus helps you zero in on the best word choice

Explanation:

Hope this helps! Brainly if so!

Likurg_2 [28]3 years ago
4 0

Answer:

false

Example: a thesaurus is NOT the best resource

You might be interested in
Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the b
hoa [83]

Answer:

Option A i.e., AES is correct.

Explanation:

The user corporation is installing the wireless server and seems to be worried when anyone representing the rival corporation might stands outside that property as well as gather wireless information. He ensured that corporation which WPA2 is safe. However, AES creates WPA2 stronger than WPA.

  • Option B is incorrect according to the following scenario because it is the security mechanism used when component through the IEEE 802.11i WLAN standard.
  • Option C is incorrect according to the following scenario because it is the protocol initially developed for configure wireless clients to such a dial-in connection device.
  • Option D is also incorrect according to the following scenario because it is the terminal access control.
6 0
4 years ago
A sentinel value ________ and signals that there are no more values to be entered:____
Hoochie [10]

Answer:

The answer is "Option b".

Explanation:

Sentinel [..] is a special value, which existence ensures the end of a loop, which performs structured data. It allows the information end to be identified where no other means are available for this, and wrong choices can be described as follows:

  • In option a, It is a special value, not a data type, that's why it is not correct.
  • Option c and Option d both were wrong because, It is an empty list, and it can't indicate the starting point of the list and guards the list.  
5 0
4 years ago
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. Yo
krok68 [10]

Answer:

have the same SSID but different channels

Explanation:

Based on the information provided within the question it can be said that the best option to accomplish this would be to have the same SSID but different channels. This would maintain the users connected to the same network name (SSID) but still be able to roam and jump from one access point to the other.

7 0
3 years ago
Read 2 more answers
When individuals are purchasing a computer, they sometimes might get the most expensive computer they can afford. Why might this
timama [110]

Answer:

Expensive is not always better

Explanation:

So I build 2 computers ok

Computer 1: Price 1,999$

<u>Whats Included:</u>

  • Antivirus
  • Anti-Over-Heat
  • Windows 8 Operating Software
  • Free VPN (For Life)
  • 24/7 Support
  • 1 year warranty
  • 3/5 Star Reviews | Main Review Type: Parts Breaking Inside

Computer 2: Price 799$

<u>Whats Included:</u>

  • Anti Virus
  • Anti Over-Heat
  • 1 Year Warranty
  • Windows 10 Operating Software
  • 24/7 Support
  • 10 Year Warranty
  • 4/5 Star Reviews | Main Review Type: Runs Smooth
  • No VPN

<h2>So Computer 2 Has better reviews and a 10 year warranty over computer 1's 1 year warranty</h2>
8 0
3 years ago
Where can the container code be found in Google Tag Manager? (select all answers that apply) a. In a pop-up window after you cre
saveliy_v [14]

Answer:

Option A and C.

Explanation:

The container code can be located in Google Tag Manager inside a pop-up window when they set up an account as well as container and Under "Admin" through choosing that container and clicking Installing Google Tag Manager.

The main advantage for Google Tag Manager, ever though, would be that it create it in much easier manner for marketing companies to execute identifiers without depends on developers to use it. Developers tend to also be preoccupied with some other high-priority initiatives so tagging mostly finishes up on the other side burner

7 0
3 years ago
Other questions:
  • You’ve been hired to help with installing cable at a new office building for the local branch of the Social Security Administrat
    14·1 answer
  • What is used for World Wide Web?
    7·1 answer
  • An employee who interacts with customers regarding the nature of their car problems, rather than actually working on the vehicle
    12·2 answers
  • What does sustainable mean<br>​
    7·1 answer
  • When considering the best technology for its particular use what should a business consider
    8·2 answers
  • What are at least three differences between a personal and non-personal blog?
    5·1 answer
  • This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defined by
    11·1 answer
  • Find products that satisfy BOTH conditions below:______
    6·1 answer
  • Q. Describe the T.V. as an ICT tool.​
    13·1 answer
  • A program virus infect​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!