1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tekilochka [14]
3 years ago
9

Fedora operating system

Computers and Technology
1 answer:
jonny [76]3 years ago
4 0
Fedora is a Linux-based Operating System which is free and open-source, <span>developed by the community-supported </span>Fedora<span> Project and sponsored by Red Hat.</span><span />
You might be interested in
What is Dailymotion Cloud on the Dailymotion site?
lana [24]
C, a video solution that is adaptable to the users storage space
4 0
3 years ago
Read 2 more answers
Make absolutely no changes to main(). Change function backwards so that the elements of the array are swapped in order for eleme
makkiz [27]

Answer:

i got you hold on.

Explanation:

5 0
2 years ago
Which of the following are breach prevention best practices?Access only the minimum amount of PHI/personally identifiable inform
Rudiy27

Answer:

All of this above.

Explanation:

All the mentioned practices can be use to prevent breaches.

6 0
3 years ago
Differentiate between soft copy output and hard copy output?​
katen-ka-za [31]

a hard copy stores data and information in the form of physical files it may be images text photographs and more a soft copy data and information in the form of virtual file saved on a computer or a drive you can preserve a hard copy for two long because its day subjected to wear and tear

4 0
2 years ago
Read 2 more answers
What is the first step for creating a Pivot Table?
vlabodo [156]
To organize your data in a list of rows and coloums. (Table, Graph)
8 0
1 year ago
Other questions:
  • Allan needs to ensure that an object is in a very precise location on a slide. He decides to use the Ruler option to achieve thi
    5·2 answers
  • 1. A video card on a modem motherboard would run best in which type of slot?
    10·1 answer
  • What type of attack intercepts communication between parties to steal or manipulate the data?
    13·1 answer
  • A type of bridge that relies on a curved, semi-circular structure for support
    5·1 answer
  • 5. How is shutter speed generally measured? What do the measurements mean?
    7·2 answers
  • What is the multiplier effect, and how can you prevent if from happening?
    13·1 answer
  • Suppose your name was Alan Turing. Write a statement that would print your last name, followed by a comma, followed by a space a
    10·1 answer
  • Signs of mastery include?
    10·1 answer
  • Discuss the differences between a quantitative and qualitative risk analysis. Please write two paragraphs.
    8·1 answer
  • You're making great progress on your assignment. You've defined the purpose of your message, identified both the primary and sec
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!