1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vazorg [7]
4 years ago
12

Need help with just #8

Computers and Technology
1 answer:
Verdich [7]4 years ago
5 0
The pictorial is an oblique cavalier. You can tell it is an oblique because the view is "straight on" with the vertical and horizontal line. And you can tell its a cavalier because depth does not appear distorted.

You might be interested in
A firm uses BitLocker for volume encryption. Normally, BitLocker performs its task well. However, an administrator was recently
raketka [301]

Answer:

The BitLocker keys were compromised

Explanation:

Given that the act of decrypting and encrypting all over is a means of troubleshooting the issue of security in computing operations. Hence, when an administrator is forced to decrypt and encrypt the entire volume, the main reason for such action can be as a result of "BitLocker keys were compromised."

Hence, the right answer, in this case, is that "The BitLocker keys were compromised."

3 0
3 years ago
Classified Computer by their age​
andreyandreev [35.5K]

Answer:

The answer is below

Explanation:

Classification of computers by age are the following:

First generation from 1940 to 1956. For example, ENIAC using a vacuum tube

Second generation from 1956 to 1963. For example, IBM 7070 using transistor

Third generation from 1964 to 1971. For example, this type of computers use an Integrated circuit

Fourth generation from 1972 to 2010. For example, IBM 5100 using a microprocessor.

Fifth-generation from 2010 to present For example IBM Watson, using Artificial intelligence.

5 0
3 years ago
Program your own file lab7.cpp in which your main() function will test the new data structure. The main() function, Declares an
Stella [2.4K]
Is this a question or just something up here just to be here
3 0
3 years ago
List the steps to identify address or link window on a phone​
Law Incorporation [45]

Answer: this is how

Explanation: if you are on your phone and a link pops up if it is blue then it is able to be clicked but if it is not blue you can simply copy and paste the link into your web browser.

7 0
3 years ago
The computer program that Josh is working on presents him with a sentence in which a word has been underlined. Josh has to indic
Phantasy [73]

Answer:

Drill and Practice

Explanation:

<em>Drill and Practice</em> is a type of Computer-based Instruction (CBI) program. In <em>Drill and Practice</em>, answered questions are given immediate feedback. These problems or exercises are structured and answered on the program to provide instant feedback to the person taking the test.

<em>For instance</em>, when going through an evaluation test but you are required to provide the correct answer before moving on. Once a question is answered, the program will indicate whether correct or wrong, if the question is correct, move to the next question but if wrong you start again. This is a typical example of Drill and practice.

This is exactly what is seen in our scenario in the question.

4 0
3 years ago
Other questions:
  • A/An is a series of instructions or commands that a computer follows; used to create software
    10·2 answers
  • Which of the following is a Microsoft solution that runs on a Microsoft Terminal Services server but appears, to end users, as i
    10·1 answer
  • I am in school what should i do i am 15
    5·2 answers
  • What is the missing line?
    5·1 answer
  • Write a program that requests the user input a word, then prints every other letter of the word starting with the first letter.
    5·1 answer
  • The table shows the price of apples in the local market. What is the cost of 12 pounds of apples? Apples (pounds) Price (dollars
    13·1 answer
  • PLEASE HELP!
    12·1 answer
  • Write a function isCString which accepts as arguments a const pointer to a char array and an integer for the size of the array
    12·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    6·1 answer
  • Void printInfo()
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!