1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
3 years ago
7

Which phrase suggests a process?

Computers and Technology
1 answer:
baherus [9]3 years ago
5 0

Answer: “She cut and pasted the materials based on the design she had planned.“

Explanation: The definition of process is

a series of actions or steps taken in order to achieve a particular end, which is exactly what Amy is doing here in order to achieve the final result.

You might be interested in
Which would you trade on a stock exchange? A: Shares B: Bonds C: Annuities
Ivan
Most likely you would trade shares
7 0
3 years ago
Read 2 more answers
Code Example 8-1
damaskus [11]

Answer:

Option A: FileNotFoundError

Explanation:

FileNotFoundError is an exception which is thrown when a program fail to open a specified file. The root causes of this type of error can be:

  1. The directory path to locate a target file is wrongly defined in our code due to a typo on the file name or misuse of relative directory path, such as ../ and ./ which denote two different paths.
  2. For some reasons, a target file is misplaced in a wrong directory.

Any one of the above reasons can lead to the exception to be thrown when the file doesn't exist.

6 0
3 years ago
Why is weather forecast so important for hang gliders?
professor190 [17]
Well, it wouldn't be such a good idea if they got caught up in a storm, would it? :p

Strong winds could blow them off-course, or even lightning has a chance of striking the hand glider, causing damage to the glider, the person, or even both.

Additionally, a weather forecast can help in my generic situations. For example, knowing whether to wrap up warm for cold weather, or wear something a bit more loose and breathable for hot weather.
6 0
4 years ago
Harlequin frogs are an endangered species that live in a small area of Costa Rica. The reasons for the species' decline is unkno
Damm [24]

Answer:

<u>a. The scientists must be careful of how many variables they include in their simulation so they do not cause further harm to the frogs.</u>

Explanation:

It is not statistically accurate to assume that the number of variables included in the simulation would cause further harm to the frogs because we need to <em>remember </em>that a simulation is simply a computerized imitation of a real situation, which is usually not totally alike with a real process.

So in no way from a statistical standpoint, does the scientists' decision on the number of variables causes direct harm to the frogs.

3 0
3 years ago
What is Sleep mode? Check all of the boxes that apply.
Liula [17]
Sleep mode (or suspend to RAM) is a low power mode for electronic devices such as computers, televisions, and remote controlled devices. These modes save significantly on electrical consumption compared to leaving a device fully on and, upon resume, allow the user to avoid having to reissue instructions or to wait for a machine to reboot. Many devices signify this power mode with a pulsed or red colored LED power light
Hibernation Edit
Main article: Hibernation (computing)
Hibernation, also called Suspend to Disk on Linux, saves all computer operational data on the fixed disk before turning the computer off completely. On switching the computer back on, the computer is restored to its state prior to hibernation, with all programs and files open, and unsaved data intact. In contrast with standby mode, hibernation mode saves the computer's state on the hard disk, which requires no power to maintain, whereas standby mode saves the computer's state in RAM, which requires a small amount of power to maintain.

Hybrid sleep Edit
Sleep mode and hibernation can be combined: the contents of RAM are first copied to non-volatile storage like for regular hibernation, but then, instead of powering down, the computer enters sleep mode. This approach combines the benefits of sleep mode and hibernation: The machine can resume instantaneously, but it can also be powered down completely (e.g. due to loss of power) without loss of data, because it is already effectively in a state of hibernation. This mode is called "hybrid sleep" in Microsoft Windows other than Windows XP.

A hybrid mode is supported by some portable Apple Macintosh computers,[1] compatible hardware running Microsoft Windows Vista or newer, as well as Linux distributions running kernel 3.6 or newer.

ACPI Edit
ACPI (Advanced Configuration and Power Interface) is the current standard for power management, superseding APM (Advanced Power Management) and providing the backbone for sleep and hibernation on modern computers. Sleep mode corresponds to ACPI mode S3. When a non-ACPI device is plugged in, Windows will sometimes disable stand-by functionality for the whole operating system. Without ACPI functionality, as seen on older hardware, sleep mode is usually restricted to turning off the monitor and spinning down the hard drive.
5 0
3 years ago
Other questions:
  • Suppose that the following regular expression is used to recognize real numbers in scientific notation in a programming language
    14·1 answer
  • Can you block someone on Brainly?
    7·2 answers
  • A common type of non-volatile memory is _____.
    12·1 answer
  • Elisa and Josh need to access General Help. Elisa will press the F1 key. Josh will click on ? in the upper-right corner of the W
    14·2 answers
  • Rachelle's computer has frequent system crashes and it takes a long time to access files and folders. What hardware component is
    8·1 answer
  • Another problem related to indefinite postponement is called ________. This occurs when a waiting thread (letâ s call this threa
    7·1 answer
  • What does a codec do? Choose all that apply.
    5·2 answers
  • What is word wrapping??
    5·1 answer
  • WILL GIVE BRAINLIEST!!!!
    14·2 answers
  • A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!