1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
9

What do these symbols mean in technology

Computers and Technology
1 answer:
marta [7]3 years ago
5 0

Answer:

1.us dollar which not not allow

2. pause botton

You might be interested in
Ok so another weird question! So if you know what google drive is and how to upload a video why does it keep adding hours! it ke
lesya [120]

Answer:Your video may be too long and you may not have that much storage left.

Explanation:

5 0
3 years ago
4. The programmer who focuses on implementing the game mechanics, rules, and other elements essential for gameplay is the
Snezhnost [94]
The answer would be gameplay programmer, as they are responsible for the implementation of gameplay  mechanics.
7 0
3 years ago
A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.
notka56 [123]

Answer:

Intrusion detection system

Explanation:

An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.

4 0
3 years ago
Write an algorithm to find the area of a circle of radius r
Bas_tet [7]

Answer:

e=mc^2

Explanation:

4 0
2 years ago
State five fonction of THE operating system​
I am Lyosha [343]

Answer:

An operating system has three main functions: (1) manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide services for applications software.

Memory Management.

Processor Management.

Device Management.

File Management.

Security.

Control over system performance.

Job accounting.

Error detecting aids.

7 0
3 years ago
Other questions:
  • The bias condition for a transistor to be used as a linear amplifier is called:________.
    14·1 answer
  • Regarding computer protection, quarantining is defined as ________. Select one: A. placing a found virus in a secure area on the
    13·1 answer
  • which of the following information technology career fields generally requires the lowest level of education for an entry level
    9·1 answer
  • The meaning of belt drives
    10·1 answer
  • Six external parts of a computer system
    13·1 answer
  • How do operating system work?
    5·1 answer
  • Write the line of code to calculate the area of a circle with radius 3 and store it in a variable called
    10·1 answer
  • How do we benefit from this increased interconnectivity?
    6·1 answer
  • Write a function float Average(int, int) that finds the mean, and then write a main program that inputs two numbers from the use
    7·1 answer
  • ________ involves disconnecting individual users from their selected internet service providers and redirecting them to illegiti
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!