1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klasskru [66]
3 years ago
13

what is created when the movement of light is blocked by an object and cannot pass through the other side?

Computers and Technology
2 answers:
larisa86 [58]3 years ago
7 0
A shadow is created.
Amanda [17]3 years ago
4 0
A shadow is created   When light can not pass trough a object

You might be interested in
A healthcare organization received notification that a hospital employee’s laptop that contained PHI was inadvertently left at a
timofeeve [1]

Answer:

Implement better protection and inform the staff.

Explanation:

The situation given in the question can be very alarming for a healthcare organization since the laptops contain critical information and details about the employee's work.

To prevent this from occuring again in the future, the organization should educate their employees on cyber security and having a strong password. They also should implement softwares on the computers against such incidents, which can be softwares that can lock the computers and delete files that are important to the organization if an unauthorized entry is detected. In order to protect the information, they can also use a backup system for every computer the employee's use.

I hope this answer helps.

7 0
3 years ago
Hacking to send a political message
Crank

Answer:

Good for you

Explanation:

But I dont get this

4 0
4 years ago
Some system analysts argue, "Give users what they ask for. If they want lots of reports and data, then that is what you should p
steposvetlana [31]

Answer:

I align with the second group of System Analysts.

Explanation:

Actually, in the IT world  most users want detailed explanations of processes, reports and data during their fault resolutions. However, they do not really know what to do with these nor would even make use of it when a fault occur on their system again. Thus, it is better for "<em>Systems Analysts to let the users know what information can be obtained from the system. If you let the users dictate, then you will never get anywhere and/or go down costly paths because the end-users really don't know what they want and do not have the technical knowledge or understanding of code, data-basing, and systems."   </em>

6 0
4 years ago
Which part of the computer is responsible for managing memory allocation for all applications
vovikov84 [41]

Answer:

Option B

Explanation:

The operating system is the type of software that is responsible for managing the processor time and also the memory allocation in the system. The operating system mainldeals with the processor time by scheduling the processor work done in the system.

The OS mainly controls the system and then schedule the execution of various types of function by the central processing unit (CPU). It also controls the memory allocation in the system.

7 0
3 years ago
What controls network connectivity such as Wi-Fi and the GPS locator in a mobile device?
Alex Ar [27]

Answer:

Option B: IMSI is correct answer.

IMSI controls the network connectivity such as WiFi and the GPS locator in the mobile device.

Explanation:

  • IMSI stands for International Mobile Subscriber Identity.
  • Basically IMSI is number key that helps to identify each user in a cellular network uniquely.
  • Each mobile device in a network sends IMSI number as a 64-bit field to the network.
  • Home Location Agent also uses IMSI number in order to acquire details.
  • It may be a 15 digit number or short.

<h2>I hope it will help you!</h2>
8 0
3 years ago
Other questions:
  • What happens when a returntype, even void, is specified as a constructor in Java?
    14·1 answer
  • Sabiendo que el engranaje motriz tiene 14 dientes y gira a 4000 RPM, y el conducido tiene 56 dientes, responde:
    11·1 answer
  • Reversing the elements of an array involves swapping the corresponding elements of the array: the first with the last, the secon
    11·1 answer
  • Write a Python function uniquely_sorted() that takes a list as a parameter, and returns the unique values in sorted order.
    15·1 answer
  • python Write a program that will take a file named Celsius.dat that contains a list of temperatures in Celsius (one per line), a
    9·1 answer
  • A non technical kind of cyber intrusion that relies heavily on human interaction and often involve tricking people into breaking
    5·1 answer
  • In which of the following situations is it probably better to use a fixed-size array over another more flexible option, like Arr
    6·1 answer
  • Does anyone know about ICT? i need help ASAP
    9·1 answer
  • a flow chart is the _______ representation of the sequence of steps required of steps required to solve a particular problem​. I
    9·1 answer
  • Twenty years ago, most games were sold in brick and mortar stores. How did independent game developers get their games into thes
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!