1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lostsunrise [7]
4 years ago
9

50 points!!!!!

Computers and Technology
2 answers:
Rudiy274 years ago
8 0
The correct answer is <span>a. correcting others’ spelling and grammar

Typing with caps lock is also not proper netiquette but it doesn't affect the relations between people if everyone sees that you're just using caps. Correcting others' spelling and grammar can affect others and offend them and would generally be bad for discussion forums and boards since you present yourself as annoying. Especially since many people might not even be from English speaking countries.</span>
prohojiy [21]4 years ago
3 0
I would say a. correcting others' spelling and grammar.
You might be interested in
Consider a multidimensional array A stored in row-major order with 22 rows and 6 columns whose subscripts start at 0. If each el
siniylev [52]

Answer:

Option c is the correct answer for the above question.

Explanation:

  • If the array will store in row-major order, then it will be a store like the first row, then second row and then third row.
  • If the user wants to conclude the address of the A[3,5], then the address of the A[3,5] will be 184.
  • It is because the 3 states the row number and the 5 states the column number.
  • The above question states that every value take 8 bit. and there are 4 rows from 0 to 3 and 6 column (0 to 5) for every row (except the fourth rows because it takes 5 columns from 0 to 4) before the A[3,5].
  • So there are 23 value before A[3,5] which are as-- [00,01,02,03,04,05][10,11,12,13,14,15][20,21,22,23,24,25][30,31,32,33,34].
  • So when every value takes 8 bit then 23 value takes 184 bits(23*8).
  • So the address of A[3,4] is 184.
  • Hence option c is the correct and the other is not because of 184 stated from the c option only.
4 0
3 years ago
1. ___________ ensures the integrity and security of data that are passing over a network.
allochka39001 [22]

Answer:

The correct answer to the following question will be Option D (Network-security protocols).

Explanation:

  • Methods and procedures for protecting network data from unwanted information retrieval are managed by network security protocols.
  • They are a network-style protocol that guarantees the protection and privacy of data in transit through a wireless connection. It describes procedures and techniques for protecting network data from every unauthorized effort to access or remove data material.

Therefore, Option D is the right answer.

5 0
4 years ago
You can use automatic link-checking software to identify invalid hyperlinks. if you find invalid links, what should you do next?
Solnce55 [7]
Correct the href value of the appropriate anchor.
7 0
3 years ago
If you delete a shortcut from your desktop, have you also deleted the original file?
svet-max [94.6K]

Answer:

no

Explanation:

it just deletes the icon.

4 0
3 years ago
Read 2 more answers
Whose email address may the agent enter into the applicant information section of LEAN enrollment application
stich3 [128]

It is the customer's email address may be entered into the applicant information section of LEAN enrollment application

<h3>What is LEAN enrollment application?</h3>

LEAN enrollment application is a kind of electronic enrollment program which is specifically designed to make enrollments easier for agent

So therefore, It is the customer's email address which may be entered into the applicant information section of LEAN enrollment application

Learn more about enrollment application:

brainly.com/question/18186504

#SPJ1

6 0
2 years ago
Other questions:
  • When a vehicle strikes a pedestrian, it's most often during A. a period of darkness or low visibility B. the day when pedestrian
    10·2 answers
  • After a file downloads, you can do any of the following except
    13·1 answer
  • Cover page styles in the cover page gallery match the preformatted styles in word, making it easier to create a coherent style b
    5·1 answer
  • What happens when two computers use the same IP address?
    6·1 answer
  • To use the mail merge feature in Access, the first step is to start the Microsoft Word Mail Merge Wizard.
    11·1 answer
  • What is thought to have caused the extinction of the dinosaurs?
    13·1 answer
  • What are 2 main differences betweenarrays andstructs?
    7·1 answer
  • There are 4 fruits apples,oranges,bananas and grapes. Each student can pick up 2 fruits.There are some conditions which have to
    5·1 answer
  • What is the job of a router during the process of routing on the Internet?
    10·1 answer
  • How do i make a comment on brainly?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!