1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tamiku [17]
3 years ago
14

Assessment timer and count Assessment items Item 6 How many different keys can be used in a single sort? 1 2 3 4

Computers and Technology
1 answer:
Alik [6]3 years ago
6 0

Answer:

Its C 3. hope this helps

Explanation:

You might be interested in
Which does plug-and-play refer to?
vlabodo [156]
The answer is c the ability for the os to detect
7 0
3 years ago
Which of the following statements is false? A.The concepts of icons, menus and windows were originally developed by Xerox PARC.
Fudgin [204]

Answer:

(b) Windows is an open source operating system (<em>This is not correct</em>)

Explanation:

Option a is <em>correct</em> because Xerox PARC(Palo Alto Research Center), which is a subsidiary of the Xerox corporation, has been greatly responsible for invention and development in modern computing devices. Some of these developments are in Ethernet and graphical user interface (making use of menus, icons e.t.c).

Option b is <em>not correct</em> because Windows Operating system is not an open source operating system. Open source OS means users can interact with the driving code of the OS and make modifications. Windows does not support this feature. Operating systems that are open source include Linux and OpenSolaris.

Option c is <em>correct</em>. An operating system has two main components - the kernel and the user interface. The core component of an operating system is the Kernel as it interacts directly with the hardware and manages system resources. The user interface on the other hand allows users to interact with the kernel of the operating system using texts and/or graphics as commands.

Option d is <em>correct</em>. Linux operating system is an open source OS. Therefore, the source code is made available to the public for examination and modification.

8 0
3 years ago
Participants in open _________ community projects get experience and make connections with other professionals that can be valua
aleksandrvk [35]

Participants in open source community projects get experience and make connections with other professionals that can be valuable resources during a job hunt.

8 0
3 years ago
Information that indicates ground air or navy force levels or dispositions is what security?
AlexFokin [52]

Information that indicates ground air or navy force levels or dispositions is <u>confidential</u> security.

Security for a country's higher organizations is essential for a nation's protection.

Serious information like the nuclear organizations, army, navy, and ground air is at a higher risk for threats and hence requires higher security.

The information in such higher organizations is kept confidential and no third person is allowed access to the code of conduct of such organizations.

If information is leaked from the ground air or from navy force levels then there can be serious consequences for it. Hence, such information is always kept under confidential security.

To learn more about security, click here:

brainly.com/question/25375059

#SPJ4

8 0
1 year ago
Some files appear dimmed in one of the default folders on your computer. What would be the best course of action?
Wittaler [7]
It appears that they might be labeled "Hidden" in the properties of that file. Right Click on Properties and Uncheckmark Hidden<span />
7 0
3 years ago
Other questions:
  • Software design and implementation are interleaved activities. The level of detail in the design depends on the type of system b
    5·1 answer
  • What is connectivism and how does it apply to online learning?
    7·1 answer
  • Question 14. (3.04 MC) how does the project manager evaluate the scope of a project
    14·1 answer
  • Ben's team is working on an English project. The members want to see everyone's progress on their part of the project. What tech
    7·2 answers
  • For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which fe
    5·2 answers
  • The database must be carefully planned to allow useful data manipulation and report generation.
    10·1 answer
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
  • Do you want my hero academia?<br><br><br><br><br><br> if so, who's your favorite character :&gt;
    5·2 answers
  • What bonnie is this? From five night at freddys
    9·1 answer
  • security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!