1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
15

SIKILDIM OF NAPİM TÜRK OLAN VARMI

Computers and Technology
1 answer:
vekshin13 years ago
8 0

ben varım
bende sıkıldım ya

You might be interested in
The​ ________ is a​ c-shaped structure that curves around the pancreas and stomach
Sever21 [200]
The duodenum is the c-shaped structure that curves around the pancreas and stomach , it is actually the smallest part of the small intestine and joins the stomach to the jejunum <span />
6 0
3 years ago
An OS X backup utility that automatically backs up files to a dedicated drive that is always available when the computer is turn
Darya [45]

Answer:

Time machine.

Explanation:

An OS X backup utility that automatically backs up files to a dedicated drive that is always available when the computer is turned on is called a time machine.

OS X was released in 2001 and it's Apple's version ten (10) of the operating system that runs on its Macintosh computers.

A time machine is a software tool built into the Mac operating system and it is primarily designed to automatically backup user files or data onto a dedicated drive such as an external hard drive disk through a wired connection, by using a Thunderbolt or universal serial bus (USB) cable. The automatic backup can as well be done wirelessly through a network connection.

5 0
3 years ago
Suppose that a laptop identifies its processor as follows: AMD’s A84500M. What does the AMD represent?
zalisa [80]

Answer:

Advanced Micro Devices

Explanation:

4 0
3 years ago
1. Discuss why it is so important for all application builders to always check data received from unknown sources, such as Web a
Ivan

Answer:

1. It is so important for all application builders to always check data received from unknown sources before using that data. This is because of the Security related reasons and vulnerabilities .For example the data received might contain harmful hidden viruses.  Web applications are accessed by internet and these are the most vulnerable to attacks by hacker or intruders using harmful data containing malware. This can cause security breaches due to the security flaws or bugs in Web applications. So to overcome such security risks which can cause damage in the Web applications, data from unknown sources should be checked.

Explanation:

2. When the Website is being used and running, there is a room for possible glitches or other bugs and issues. To understand, handle and address  issues successfully, the website operators carefully and consistently patch and configure their systems. The administrators collect the user data which enables them to have enough data in order to make the requisite alterations or improvements in the website. This also helps to improve the website performance. The patching and configuring of systems fix problems in the website which reduces the risk of website damage and the website works smoothly this way. Moreover it identifies vulnerabilities, solve configuration issues and upgrades in website features provide additional capabilities to the website.

8 0
3 years ago
Give at least five (5) practices that you must observe in your classroom.​
atroni [7]

Answer:

Offer second chances/clean slates.

Be resourceful.

Make learning active.

Be an advocate.

Pursue lifelong learning.

8 0
3 years ago
Read 2 more answers
Other questions:
  • In the legend of sleeping Hallow what does Ichabod Crane fear the most
    13·2 answers
  • Go in my discord server Code is . (CebjBXN)​
    10·2 answers
  • If you type too much text on a PowerPoint slide, the additional text is added to a second slide.
    9·1 answer
  • Unscramble the words <br><br> A: ESUOM RETUPOC <br><br> B: KSID EVIRD
    12·2 answers
  • As a general rule, what is the size of a brochure?
    11·1 answer
  • What is the action take to the input called?
    15·1 answer
  • Define each of the following data mining functionalities: characterization, discrimination, association and correlation analysis
    9·1 answer
  • Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the
    12·2 answers
  • Select the correct answer.
    10·1 answer
  • Write c++ program from 1to 100 to find prime numbers using statement.<br><br>please help me​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!