1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady bird [3.3K]
3 years ago
13

Started: Sep 28 at 1:45p 5 Quiz Instructions les 1 pts Question 1 Computer Hardware can consist of what​

Computers and Technology
1 answer:
Furkat [3]3 years ago
8 0

Answer:

t

Explanation:

You might be interested in
Which letter is represented by the code 01001011?
Nastasia [14]
First questions answer is : K
……
Second question :

To solve these questions you take 8 digits and look for them in the table ~
01001000 H
01000101 E
01001100 L
01001100 L
01001111 O

Answer : HELLO
6 0
3 years ago
Read 2 more answers
Sending obscene material over the internet cannot be successfully prosecuted because of what
babunello [35]
Hey there! Hello!

For this question, I'm not sure if you have multiple choice answers; if you do and my answer doesn't really fit into any of them, let me know and we'll take it from there.

Putting anything on the internet can pretty much guarantee that it will stay on the internet forever. Someone, whether it be someone who saved/screenshot your post or the service that controls the posts of the website saving a copy of it and all other posts, it's impossible to get rid of all remnants of a post once you have posted it. Think of all the people who may have reblogged/retweeted/re-whatevered a post on a service that supports it, too.

Most social networks put in their Terms and Conditions that they are allowed to see any and all of what anyone posts or sends to someone through their service. If you DM your significant other a picture of you that you wouldn't want your mom to see, the social service then has the right to view and save information related to the post for quality/functionality/ whatever other reasons. Social services usually have the right to save copies of any information you give to them, whether it be your name/email address or a credit card, for advertising/other purposes.

Also keep in mind that caches exist. The entire purpose of Google Cache is to dig up HTML's from old websites that don't exist anymore for the purposes of allowing someone to view their beauty once more.

Point is, you can burn papers and the information that they held, as long as it wasn't copies and distributed, will be gone. But it's not exactly possible to burn deep-rooted information in the internet's servers that may not be accessible to you once you have deleted your copy of it, but very much accessible to anyone with the expertise to dig it out.

Hope this helped you out! Feel free to ask any additional questions if you have any. :-)
5 0
3 years ago
You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the priv
nalin [4]

ANSWER:

E

EXPLANATION:

myHostname = window.location.hostname;

var myTLD = "." + myHostname.substring(myHostname.indexOf("wupload") + "wupload.".length).split(".")[0];

function afterLoad() {

 return

}

ieFixForFileSelectionOnChangeEventTimer = null;

function ieFixForFileSelectionOnChangeEvent(a) {

 $("#siteName").toggle();

 if ($("#inputFileSelection").val() == "") {

   ieFixForFileSelectionOnChangeEventTimer = setTimeout("ieFixForFileSelectionOnChangeEvent()", 200)

 } else {

   $("body")[0].focus()

 }

}

function urlencode(a) {

 return escape(a.toString().replace(/%/g, "%25").replace(/\+/g, "%2B")).replace(/%25/g, "%")

}

$(document).ajaxStart(function() {

 $("body").addClass("ajaxLoading")

});

$(document).ajaxStop(function() {

 $("body").removeClass("ajaxLoading")

});

$(document).ajaxError(function(d, c, a, b) {

 CMApplication.Widgets.Dialog.close();

 CMApplication.Widgets.Dialog.displayMessage(c.responseText, CMApplication.Widgets.Dialog.Types.exception)

});

jQuery.setCookie = function(b, c, a) {

 var d = new Date();

 d.setDate(d.getDate() + a);

 cookieDomain = ".wupload" + myTLD;

 document.cookie = b + "=" + escape(c) + ((a == null) ? "" : ";expires=" + d.toUTCString() + "; path=/;domain=" + cookieDomain + ";")

};

jQuery.getCookie = function(a)

4 0
4 years ago
When starting a computer running Windows Vista, a technician sees that the error message "BOOTMGR is missing" appears after the
docker41 [41]

Answer:

B and C

Explanation:

Possible solution to solving "BOOTMGR is missing" error in Windows Vista is to use the Windows Recovery Environment.

Another option is to run "bootrec/fixboot" command from the comman prompt and the command prompt is also accessible from the windows recovery environment.

8 0
3 years ago
When web developers specify color values for text or backgrounds, they often represent RGB (red-green-blue) colors using a six-d
neonofarm [45]

Answer: A #3f107f.

Letter B would produce a lighter blue-purple color rather than a darker shade of purple. Letter C would produce a very light purple color. Letter D would produce a Black color, making it very dark and not in the range of being purple.

Letter A would produce a darker shade of purple. As explained in the way that the RGB color hexadecimal uses, the amount of each respective color is 2 digits for each color Red, Green, Blue respectively.  By reducing the amount of each color in the RGB mode, the output will become a darker shade as the RGB mode is an ADDITITIVE type of color mode.

7 0
3 years ago
Other questions:
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • How does a main program recieve info from a function in c++?
    6·1 answer
  • BRALYEST TO FIRST PERSON THAT IS CORRECT!!! Select the correct navigational path to add titles to your printable worksheet. Clic
    9·2 answers
  • Which method of accessing FTP has the most limited capabilities?
    9·2 answers
  • A software firm is going to develop an application for the automation of various office activities within an organization. In th
    13·1 answer
  • You and a few friends are having a meal at a pizza restaurant, and the server has just given you the bill. Write a function that
    14·1 answer
  • What do secondary sources rely on for their analysis of events?
    6·2 answers
  • Teachers can organize the classroom environment to facilitate activities and to prevent problems. True Or False
    15·1 answer
  • What directs the read/write arm of the hard drive to where data exists and accesses it upon the user's request?
    8·1 answer
  • A spreadsheet has some values entered: Cell A1 contains 10, cell A2 contains 14, cell A3 contains 7. You enter in cell A4 the fo
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!