1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lisa [10]
3 years ago
11

Please help me with this question. I don’t get it

Computers and Technology
2 answers:
tresset_1 [31]3 years ago
5 0

Answer:

A

Explanation:

Lelechka [254]3 years ago
3 0
A - they all use microprocessors to compute and store data.
You might be interested in
Select the correct answer from each drop-down menu
Lana71 [14]

Answer:

The purpose of the domain name is for credibility and location purposes.

Explanation:

For example.

nz.gov means that the domain owner is the government on New Zealend

8 0
3 years ago
What should be included in research for a problem statement? Select all that apply
Burka [1]

Answer:

I think the answer is C and D

7 0
3 years ago
Read 2 more answers
Before creating a brief to design a product, what is needed
castortr0y [4]

Answer:

A good design brief often begins with some information about the client and what their brand stands for. Including this helps to connect an individual project with the bigger picture. Aim to capture key points about what the company does, how big they are, and what their key products or services are.

Explanation:

A good design brief often begins with some information about the client and what their brand stands for. Including this helps to connect an individual project with the bigger picture. Aim to capture key points about what the company does, how big they are, and what their key products or services are.

8 0
3 years ago
A red wavy line under a word means _____. a change has been made in the text a new word was inserted in the document there is a
zloy xaker [14]
Hi there!

The correct option is C. <span>there is a spelling mistake. The red wavy line indicates that a word was spelled incorrectly, sometimes though this function does not recognize the word it can mark it as incorrect even when it is not, in which case you can right-click the marked word and add it to your computer's internal word dictionary. Right-clicking an incorrectly spelled word will also give a short list of words that are similar to the one you are trying to spell, clicking on one of the given words will automatically change the marked word to the one you chose.

-Your friend, ASIAX</span>
7 0
4 years ago
Read 2 more answers
Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3,
Luden [163]

Answer:

This is not true

Explanation:

The optimal Huffman code is used to encrypt and compress text files. It uses fixed-length code or variable-length code for encryption and compression of data.

The professor's character code is similar to Huffman's variable-length coding which uses variable length od binary digits to represent the word strings. The file size of the text file above is;

= 6 x 1 + 2 x 2 + 3 x 2 + 2 x 2 + 8 x 1 = 28 bits

This would be the same for both cases.

The encrypt would be the problem as the encoded and decoding of the characters B and E may cause an error.

8 0
3 years ago
Other questions:
  • Describe the photograph that David begins discussing what is the contacts for the photograph
    7·1 answer
  • Privacy Group of answer choices must be respected if we are to function as complete, self-governing agents is an absolute value
    5·1 answer
  • PLEASE HELP!
    14·2 answers
  • Which person would be the best fit for a career in the Information Technology field?
    6·2 answers
  • Kinda strange, and im good
    11·2 answers
  • A mesh network topology allows all computers to be directly connected. True or False
    9·1 answer
  • Choose all of the items that represent functions of an operating system.
    11·1 answer
  • Josh is learning about hackers known for causing damage and altering functions of websites. Which type of hacker is he learning
    10·2 answers
  • Think about all the different ways you communicate with other people throughout your day. • What makes this communication succes
    15·1 answer
  • In a database, what term is used to describe a group of fields that are all associated with and accessed using single primary ke
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!