1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sholpan [36]
4 years ago
9

If you're unsure if something

Computers and Technology
2 answers:
SSSSS [86.1K]4 years ago
5 0
A. Research the information
gladu [14]4 years ago
4 0
A. Research the information
You might be interested in
Convert (0.255)¹⁰ into binary<br>​
nasty-shy [4]

0.01000001010001111011

Must click thanks and mark brainliest

3 0
3 years ago
Which math operator is used to show multiplication in a spreadsheet formula
Anna11 [10]

Astrix (*) is used to multiply

Example: 5*5 (the answer would come out as 25)

If you’re using Excel, do it in the formula bar of course.

8 0
3 years ago
How do computer users benefit from the increased speed?
erma4kov [3.2K]

Answer:

jrjhfn4

Explanation:

jejehrurjrbrr

7 0
3 years ago
Q#1.What general categories of functions are specified by computer instruction?
natali 33 [55]
Is this for a test, because someone else asked that like 5 seconds ago.

4 0
4 years ago
Gina works in an SDLC team. When Gina makes changes to a file, no one else is allowed to acess it. Which type of version control
Dmitry [639]

Answer:

A. file locking.

Explanation:

File locking in computer technology is a data management mechanism used by software developers to completely restrict access of other users to a software program or computer file by granting permissions to only one user who can delete, modify or edit the application program at any point in time. This simply means that in the software development life cycle (SDLC), file locking is used to avoid interceding update on a particular software by restriction of other users while it's being modified by another user.

For instance, if two users (Gina and Mike) open the same software program, Gina then proceed to modify and save the changes. If Mike also modifies the software program and saves it, this would overwrite Gina's update. Hence, in order to prevent this type of conflict in software development, it is highly recommended that a file locking mechanism is adopted.

<em>This ultimately implies that when Gina make changes to a file, no one else is allowed to access the file because a file locking mechanism is being used by Gina's company as a version control process. </em>

8 0
4 years ago
Other questions:
  • True or false a computer network requires both hardware and software
    9·2 answers
  • 3) An example of interactive web page is<br>​
    11·1 answer
  • _______ is the component of the information system that is described as the equipment that processes data to create information.
    6·1 answer
  • 6) Sometimes it is difficult to read a piece of code and understand what the code will do. For this reason, you may want to add
    9·1 answer
  • A(n) _____ access file is also known as a direct access file.
    13·1 answer
  • 2. Which the following may be a reason for giving a Page Quality (PQ) rating og Highest? Select all that apply (True or False)
    14·1 answer
  • _____ parser is an LL parser that is implemented by writing code directly from the grammar of the source language. EBNF is ideal
    7·1 answer
  • PLZ ANSWER ALL MY QUESTION. Which line of code will display the variable num rounded to the nearest tenth?
    14·1 answer
  • 1.what is a computer?
    5·1 answer
  • Give examples of an outdated memory or storage device. what do you think is the main reason they are outdated?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!