1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
3 years ago
15

25 POINTS HELP PLEASE IM TIMED

Computers and Technology
1 answer:
Studentka2010 [4]3 years ago
8 0
Answer: b) implicit hth :)
You might be interested in
What is the processing speed for the second generation of computers​
natima [27]

Answer:

10mbps

Explanation:

that's what the internet says

5 0
3 years ago
Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company
Arisa [49]

Answer:

Losing jobs. Fire. Destruction of property.

Explanation:

Having a company shut down due to lack of protection and having people testify products unsafe. If software blows up it could cause desturction of property therefore causing the effect of many people losing their jobs.

4 0
3 years ago
Give two benifets to the supermarket maneger and two benifets of customers of using barcods on all items
sergey [27]

Answer:

The benefit of barcodes on items for the manager and the customers are as follow-

Explanation:

Benefits of using bar codes on all items to the manger are as follow -

  • The process of customer dealing increases by quickly scanning the item, rather than manually noting down the details.
  • The track record of all the items can be maintained properly.

Benefits of using bar codes on all items to the customers are as follow -

  • The time period to purchase any item increases, hence the customer can shop for many items in short span of time.
  • The chances of any mistake gets reduced, as everything is done digitally.
5 0
3 years ago
If your vehicle has fuel injection and the engine is cold,
olga nikolaevna [1]
D. Press the accelerator to the floor once and release it.
6 0
3 years ago
Sending obscene material over the internet cannot be successfully prosecuted because of what
babunello [35]
Hey there! Hello!

For this question, I'm not sure if you have multiple choice answers; if you do and my answer doesn't really fit into any of them, let me know and we'll take it from there.

Putting anything on the internet can pretty much guarantee that it will stay on the internet forever. Someone, whether it be someone who saved/screenshot your post or the service that controls the posts of the website saving a copy of it and all other posts, it's impossible to get rid of all remnants of a post once you have posted it. Think of all the people who may have reblogged/retweeted/re-whatevered a post on a service that supports it, too.

Most social networks put in their Terms and Conditions that they are allowed to see any and all of what anyone posts or sends to someone through their service. If you DM your significant other a picture of you that you wouldn't want your mom to see, the social service then has the right to view and save information related to the post for quality/functionality/ whatever other reasons. Social services usually have the right to save copies of any information you give to them, whether it be your name/email address or a credit card, for advertising/other purposes.

Also keep in mind that caches exist. The entire purpose of Google Cache is to dig up HTML's from old websites that don't exist anymore for the purposes of allowing someone to view their beauty once more.

Point is, you can burn papers and the information that they held, as long as it wasn't copies and distributed, will be gone. But it's not exactly possible to burn deep-rooted information in the internet's servers that may not be accessible to you once you have deleted your copy of it, but very much accessible to anyone with the expertise to dig it out.

Hope this helped you out! Feel free to ask any additional questions if you have any. :-)
5 0
3 years ago
Other questions:
  • A ____ is any manipulation of data, usually with the goal of producing information.
    9·1 answer
  • Consider that an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker breaks in
    5·1 answer
  • Critics of media consumption
    10·2 answers
  • Which of the following is the shortcut key combination for pasting copied text?
    11·2 answers
  • In popular usage and in the media, the term ________ often describes someone who breaks into a computer system without authoriza
    10·1 answer
  • Do you think you should learn to program? Why? why not?
    11·1 answer
  • Consider the following code:
    5·1 answer
  • Why is computer called and information processing machine​
    6·1 answer
  • In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
    10·1 answer
  • When companies charge different prices for the same product, they're using
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!