1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bearhunter [10]
3 years ago
7

Addition and subtraction are considered to be ____ operations performed by a computer.

Computers and Technology
1 answer:
Natali5045456 [20]3 years ago
4 0

Answer:

Mathematical operations

You might be interested in
PLEASE HELP!!!!!!!!!!! If you whisper while telling someone a secret, your nonverbal communication is          your verbal inter
Assoli18 [71]
The answer is repeating 
3 0
3 years ago
The most common schedule for tape-based backup is a _____ backup, either incremental or differential, with a weekly off-site ful
sergejj [24]

The most common schedule for tape-based backup is called the daily on-site backup.

<h3>What is daily backup?</h3>

The daily backup is known to be a kind of backs up of only files that were were said to be modified that day.

A full backup is known to be a full and complete backup of the whole system, such as all applications, operating systems components, etc.

Learn more about  backup from

brainly.com/question/86807

8 0
2 years ago
You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the dis
creativ13 [48]

Select All that apply

Answer:

These are the things that are would be appropriate in a post.

B. Checking your post for typos or grammatical errors.

C. Giving credit to the original author.

D. Including your own thoughts about the article.

Explanation:

The correct answer options B, C, and D" According to unofficial online or internet usage it is believed that sharing informative articles is a reasonable use of a website forum as much the credit goes back to the actual or original author. Also, it is believed that posts should be suitable for data analytics checked for typos and grammatical errors.

7 0
3 years ago
Bailey wants to add file protection to a document she has created. She wants to restrict users from changing the content she has
jonny [76]
Id say (B) File, Permissions, Restrict Editing, Editing Restrictions, Comments, Start Enforcement, then enter her password

However much you may want your reviewers to make comments and suggest changes in a document, there may be times when you want to restrict them from changing the content you have created. To restrict formatting in a document, you can click restrict formatting in the protect section of the review tab and follow the procedure in the answer above.


8 0
3 years ago
Read 2 more answers
Why is hydrgoen in any group on the periodic table
Radda [10]

Answer:

Hydrogen is placed above group in the periodic table because it has ns1 electron configuration like the alkali metals. However, it varies greatly from the alkali metals as it forms cations (H+) more reluctantly than the other alkali metals. ... Hydrogen has a much smaller electron affinity than the halogens.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In one to two sentences,
    9·2 answers
  • What is the WiFi signal strength in different iPhone models?
    7·1 answer
  • What should be done if a system cannot boot from the hard drive?
    14·1 answer
  • What environmental hazards exist because of man’s desire for profit?
    11·2 answers
  • ¿Qué significa PPO a nivel de programación?
    15·1 answer
  • An end-user license agreement protects _____.
    7·1 answer
  • Help plz
    10·1 answer
  • Date Time Manipulation Exploration If you start from Jan 1st, 1757, and repeatedly add 8 days, until you hit 1800, how many time
    14·1 answer
  • Question #2
    8·2 answers
  • What is malware? What are some signs that malware may be impacting the performance of your computer? How can you avoid malware?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!