1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bond [772]
3 years ago
12

Guys how do i add or insert a diagram for similarities on google docs.

Computers and Technology
1 answer:
Vikki [24]3 years ago
7 0
Usually I go to the Photos and I find a photo that already had the diagram
You might be interested in
The variety of theatre introduced in the 1960s that denotes semi-professional or even amateur theatre in the New York/Manhattan
antoniya [11.8K]

Answer:

The answer is letter A. TRUE

Explanation:

The variety of theatre introduced in the 1960s that denotes semi-professional or even amateur theatre in the New York/Manhattan area, often in locations such as church basements, YMCAs, and coffeehouses, is commonly known as off-off-Broadway.  This statement is true.

3 0
3 years ago
The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:_________
SashulF [63]

Answer:

A. Arbitrary code execution

Explanation:

A buffer-overrun, also known as buffer overflow occurs when a programmer makes an error during coding, which could make his system easily susceptible to attacks from a hacker. The root cause of this problem is an overflow of data in a buffer, and programs that are written in C and C+ + are more likely to be affected by this problem.  When a buffer-overrun occurs, it would most likely lead to arbitrary code execution.

Arbitrary code execution is an uncontrolled and unrestricted coding by the attacker which alters the original coding. The attacker could input more information into the coding, which alters the original information and which would make the application porous and accessible by just anyone. It is important that programmers run regular tests on their programs, so as to detect any coding errors.

8 0
3 years ago
A keyboard, mouse, and microphone are examples of ________.
kykrilka [37]

Answer:

A keyboard, mouse, and microphone all are examples of <u>peripheral devices.</u>

Explanation:

hope this helps

5 0
2 years ago
Read 2 more answers
Which statement gives an advantage of multicellular organisms?
slava [35]

Answer:

D and B

Explanation:

Multicellular organisms thus have the competitive advantages of an increase in size without its limitations. They can have longer lifespans as they can continue living when individual cells die. Multicellularity also permits increasing complexity by allowing differentiation of cell types within one organism.

4 0
2 years ago
Read 2 more answers
This process can be applied to help workers choose the best telecommunications technology to do a specific task.
Lisa [10]
B. Internet Telephony would be my best guess. I'm not that good with computers. Hope this Helps :-)
4 0
3 years ago
Read 2 more answers
Other questions:
  • Hi, I have several computer questions. These refer to the history of the internet. I would like to know if everything we look fo
    12·1 answer
  • Assume you have just started a new job, have a car loan, and have a student loan. You have just received a cash gift of $1,000 f
    14·1 answer
  • Below is a 4-bit down-counter. What is the largest number of the counter if the initial state Q3Q2Q1Q0=0011? (D3 and Q3 are MSB,
    14·1 answer
  • In information systems, _____ is information from a system that is used to make changes to input or processing activities.
    6·1 answer
  • Write a program that has an array of at least 50 string objects that hold people’s names and phone numbers. The program then rea
    12·1 answer
  • Assuming 8-bit 2's complement notation, what is the result of subtracting 00001001 from 00001101?
    11·1 answer
  • Combining two or more cells to make one is called​
    8·1 answer
  • What is another name for a numbered list
    6·1 answer
  • What is a good range for CPU usage to be considered running well?
    15·1 answer
  • Select one Layer 2 or wireless WAN technology presented in Lesson 3. Elaborate on its characteristics, pros and cons, and common
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!